Abstract. In this paper, we discuss on the extension of grid computing systems in mobile computing environments, where mobile devices can be effectively incorporated into the grid ...
The ability to carry out biometric authentication using generic cameras can be extremely useful for a variety of applications, especially in mobile devices. Palmprint based authen...
: In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation betw...
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...