Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolatio...
Radio Frequency Identification (RFID) technology has a lot of potential to automate business processes and improve visibility across the supply chain. To realize the full potenti...
In this paper, we propose that identity reference used over distributed communication should be defined independent from any attributes and/or the public keys associated with the ...
Rapid evolution of wireless networking has provided wide-scale of different wireless access technologies like Bluetooth, ZigBee, 802.11a/b/g, DSRC, 3G UMTS, LTE, WiMAX, etc. The c...
Abstract--Wireless networks are vulnerable to identity spoofing attacks, where an attacker can forge the MAC address of his wireless device to assume the identity of another victim...