- We are conducting research and development in technology for unifying the information of a large number of intelligent sensors distributed in a disaster-stricken area. Operating ...
During a disaster, emergency response operations can benefit from the establishment of a wireless ad hoc network. We propose the use of autonomous robots that move inside a disas...
PVM and other distributed computing systems have enabled the use of networks of workstations for parallel computation, but their approach of treating all networks as collections o...
This paper presents a low-cost and secure authentication protocol to reduce the computational load on both the back-end database and the tags in a distributed RFID system. The prop...
JaeCheol Ha, Hwankoo Kim, JeaHoon Park, Sang-Jae M...
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...