- Inherent limitations of mobile computing environment such as limited bandwidth, limited resourced mobile phones, and instability of wireless environment require summarized mobile...
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al. 's LCSS RFID authentication protocol, Song and Mitchell's protocol are...
Earthquake data composes an ever increasing collection of earth science information for post-processing analysis. Earth scientists, local or national administration officers and s...
Gerasimos Marketos, Yannis Theodoridis, Ioannis S....
With the increased popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection for users. Most recent RFID proto...
We present techniques to index mobile objects in order to efficiently answer range queries about their future positions. This problem appears in real-life applications, such as pr...
Dimitris Papadopoulos, George Kollios, Dimitrios G...