Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of user...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
In the IPv6 world, the IP protocol itself, i.e., IPv6, is used for a number of functions that currently fall beyond the scope of the IPv4 protocol. These functions include address ...
Mobile Code (MC) technologies provide appealing solutionsfor the development of Internet applications.For instance, Java technologyfacilitates dynamic loading of application code ...
Antonio Corradi, Rebecca Montanari, Cesare Stefane...
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Abstract. At present, network users have to manage one set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single...