Abstract— Recent outbreaks of virus and worm attacks targeted at cell phones have bought to the forefront the seriousness of the security threat to this increasingly popular mean...
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
In order to understand and gain practical insights into various aspects of Next Generation Enterprises, we are building a testbed for flexible mobile applications. We started with...
Karun Karunanithi, Khurram Haneef, Bruno Cordioli,...
We present here a framework together with a set of paradigms for mobile agent based active monitoring of network systems. In our framework mobile agents are used to perform remote...