In last decade intelligent transportation systems (ITS) and vehicular ad hoc network (VANET) became one of the most active and emerging fields of research. It is expected that thi...
Une Thoing Rosi, Chowdhury Sayeed Hyder, Tai-hoon ...
We propose a four-party password authenticated interdomain key exchange protocol which makes use of properties of identity-based cryptography and secret public keys. Being passwor...
Pervasive computing's historical driver applications include environmental monitoring, safety and security, home and office productivity and guided experience of cultural act...
Jeff Burke, Jonathan Friedman, Eitan Mendelowitz, ...
: Computer network is unpredictable due to information warfare and is prone to various attacks. Such attacks on network compromise the most important attribute, the privacy. Most o...
In this paper we present a simple framework for activity recognition based on a model of multi-layered finite state machines, built on top of a low level image processing module f...