Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
The widespread adoption of mobile communication devices combined with technical improvements of location technologies are fostering the development of a new wave of applications th...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
— This paper aims at proposing a dynamic resource reservation scheme to enhance wireless multicasting protocols run in the hierarchical mobile IP version 6 (HMIPv6) based network...
Huei-Wen Ferng, Wen-Yan Kao, Jeng-Ji Huang, David ...
User interaction is mostly based on forms. However, forms are restricted to alphanumerical data – the editing of geospatial data is not supported. This statement does not only ho...
Software license management is currently expanding from its traditional desktop environment into the mobile application space, but software vendors are still applying old licensing...