We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Recent advances in wireless technologies have made the mobile computing a reality. In order to provide services of good quality to mobile users and improve the system performance,...
Network proximity and latency estimation is an important component in discovering and locating services and applications. With the growing number of services and service providers...
In a large sensor network, in-network data aggregation, i.e., combining partial results at intermediate nodes during message routing, significantly reduces the amount of communic...
Although social research into group interaction has flourished since the 20th century, the technology of embodied conversational agents for handling multiparty interaction is stil...