—While there is more to context than location, localization and positioning must continue to be improved. Location-aware applications, such as Google Latitude, are enjoying great...
We claim that network services can be transparently added to existing unmodified applications running inside virtual machine environments. Examples of these network services inclu...
In this work we propose a method for securing port facilities which uses a set of video cameras to automatically detect various vessel classes moving within buffer zones and off-l...
Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wid...
Abstract Traditionally, research in secure group key agreement focuses on minimizing the computational overhead for cryptographic operations, and minimizing the communication overh...