Mobile services can provide users with information relevant to their current circumstances. Distant services in turn can acquire local information from people in an area of intere...
Henriette S. M. Cramer, Vanessa Evers, Tim van Slo...
In this paper we show how to simulate attacks on authentication protocols in a realistic environment. The attack on the Needham-Schroeder public key protocol found by Gavin Lowe i...
We present a set of experiments in which a robotic swarm manages to collectively explore the environment, forming a path to navigate between two target areas, which are too distant...