In this paper, we present a security framework that provides identity protection against active and passive attacks for end-points. The framework is based on a two-round-trip authe...
We consider a heterogeneous swarm consisting of aerial and wheeled robots. We present a system that enables spatially targeted communication. Our system enables aerial robots to e...
Nithin Mathews, Anders Lyhne Christensen, Eliseo F...
Current electronic commerce applications such as online auction systems are not trustworthy due to a lack of effective trust management mechanisms. A trustworthy online auction sy...
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Protocol conversion involves the use of a converter to control communication between two or more protocols such that desired system-level specifications can be satisfied. We invest...