: In this paper, we propose two simple and efficient schemes for establishing anonymity in Clustered Wireless Sensor Networks (CWSNs). The first scheme Simple Anonymity Scheme (SAS...
Lately, the once powerful one-factor authentication which is based solely on either password, token or biometric approach, appears to be insufficient in addressing the challenges ...
Sixteen wireless case studies highlight issues relating to mobile commerce in Australia. The issues include: the need for a clear business case; difficulty of achieving critical m...
Jonathan O'Donnell, Margaret Jackson, Marita Shell...
Web applications can be classified as hybrids between hypermedia and information systems. They have a relatively simple distributed architecture from the user viewpoint, but a comp...
We consider private information a commodity, of value to both the information holder and the information seeker. Hence, a customer can be enticed to trade his/her private informati...
Scott Buffett, Keping Jia, Sandy Liu, Bruce Spence...