We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Digital content is not only stored by servers on the Internet, but also on various embedded devices belonging to ubiquitous networks. In this paper, we propose a content processin...
—As a result of the wide spread of new efficient mobile communication devices, users are more and more willing to find on these devices (PDAs, Smartphones, etc) applications si...
Amir Krifa, Mohamed Karim Sbai, Chadi Barakat, Thi...
In the paper we aim to describe the project developing the Migrating Desktop infrastructure for the mobile users in a simple way. We also focus on the development testbed, which i...
Current ubiquitous computing environments provide many kinds of information. This information may be accessed by different users under varying conditions depending on various conte...