Information systems outsourcing has been viewed as an attractive option by many senior managers generally because of the belief that IS outsourcing vendors can achieve economies o...
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Integrated circuit cards or smart cards are now well-known. Applications such as electronic purses (cash units stored in cards), subscriber identification cards used in cellular te...
Distributed real-time automotive embedded systems have to be highly dependable as well as cost-efficient due to the large number of manufactured units. To close the gap between r...
Dietmar Schreiner, Markus Schordan, Karl M. Gö...
Abstract—As an emerging application scenario of wireless technologies, vehicular communications have been initiated not only for enhancing the transportation safety and driving e...