: Telecommunication networks and the Internet are growing together. Peer-to-Peer (P2P) services which are originally offered by network providers, like telephony and messaging, ar...
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
The success of service-oriented computing has important implications on how people develop user interfaces. This paper discusses a method for supporting the development of interac...
In a pervasive computing environment, users have many devices that are used to initiate or answer remote service requests, such as obtaining real-time stock quotes, handling corpo...
This paper introduces mTag, a distributed eventdriven architecture for discovering location specific mobile web services. Service discovery is initiated by touching a fixed RFID r...
Jani Korhonen, Timo Ojala, Mikko Klemola, Pasi Vaa...