Reliable, inexpensive, on-the-fly networks can be established using mobile ad-hoc network (MANET) technology. Such networks can be used in a wide variety of scenarios ranging from...
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
This paper describes an approach for enabling remote database access from heterogeneous thin clients. DataX is a proxy-based architecture that supports disconnected operation by r...
The Sensor Internet provides access to sensor services by connecting sensor nodes to the Internet infrastructure. To achieve this, current solutions rely on fixed access points or ...
Frank Siegemund, Muhammad Haroon, Junaid Ansari, P...
– The standard ISIM-based authentication mechanism of IMS is only intended for mobile phones and cannot be used for fixed IMS clients on stationary devices without SIM cards. Thi...