This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and pee...
Christos A. Papageorgiou, Konstantinos Birkos, Tas...
We extend the well-known Tree-Diffie-Hellman technique used for the design of group key exchange (GKE) protocols with robustness, i.e. with resistance to faults resulting from poss...
This paper describes the semantics of a timed, resource-constrained extension of the Creol modeling language. Creol is an object-oriented modeling language with a design that is s...
Rudolf Schlatte, Bernhard K. Aichernig, Andreas Gr...
Global Number Portability (GNP) is becoming a key service to increase competition and profit of a service provider for the ever-growing telephone marketplace. In this paper, we pr...
Kyu-Hyung Kim, Dong-Hee Lee, Eun-Ju Ha, Jong-Tae P...
The proliferation of mobile computing devices and local wireless networks has promoted a growing interest in location-aware systems. The problem with existing positioning techniqu...
Yesid Jarma, Golnaz Karbaschi, Marcelo Dias de Amo...