We propose a novel solution for securing wireless ad-hoc networks. Our goal is to provide secure key exchange in the presence of device failures and denial-of-service attacks. The ...
Arno Wacker, Timo Heiber, Holger Cermann, Pedro Jo...
We consider the challenge of dynamically adapting services to context changes that occur in ubiquitous computing environments (e.g., changes in a user's activity) and propose ...
Cristian Hesselman, Andrew Tokmakoff, Pravin Pawar...
The objective of this paper is to propose a cryptographic protocol which provides authenticity in the exchange of information between two entities without using any shared secret ...
- The requirement for high standards of professionalism in graduating Computer Science and Information Technology students suggests the applicability of experiential learning. This...
Kirsten Wahlstrom, Susan Tyerman, Rebecca Witt, Ky...
When involved in collaborative tasks, users often choose to use multi-synchronous applications in order to concurrently work in isolation. Hence, privacy of their changes is maint...