Due to their self-configuring and self-healing capabilities, as well as their low equipment and deployment cost, Wireless Mesh Networks (WMNs) based on commodity hardware present...
Asad Amir Pirzada, Marius Portmann, Jadwiga Induls...
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...
Microprocessor designers use techniques such as clock gating to reduce power dissipation. An unfortunate side-effect of these techniques is the processor current fluctuations th...
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Learning “the wiki way”, learning through wikis is a form of selfregulated learning that is independent of formal learning settings and takes place in a community of knowledge...
Joachim Kimmerle, Johannes Moskaliuk, Ulrike Cress