Global systems – systems which may operate over transient networks including mobile elements and in which computation itself may be mobile – are gaining in importance. Neverthe...
Hubert Baumeister, Nora Koch, Piotr Kosiuczenko, P...
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new r...
Wayne A. Jansen, Tom Karygiannis, Michaela Iorga, ...
Most of existing user authentication schemes require high computation cost of exponentiation operations for the purpose of security. However, it is not suitable for mobile devices...
The protection mechanisms of current mainstream operating systems are inadequate to support confidentiality and integrity requirements for end systems. Mandatory access control (M...
Security is increasingly becoming an important issue in the design of real-time parallel applications, which are widely used in the industry and academic organizations. However, ex...