Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bou...
Abstract—Power management is an essential component of any electrical system, and nowadays a limiting factor in the miniaturization of portable electronic devices. Not only are t...
E. O. Torres, Min Chen, H. Pooya Forghani-zadeh, V...
Abstract. We propose a unified ubiHome application service model which provides user-centered services by exploiting intelligent context-awareness. Recently, most of research relat...
We present an experimental study showing that soft memory errors can lead to serious security vulnerabilities in Java and .NET virtual machines, or in any system that relies on ty...
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...