We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, w...
To allow for an efficient usage of a device in pervasive computing environments, reliable and yet convenient user access is an important requirement. The problem becomes more comp...
Abstract. Networked embedded systems are composed of a large number of components that interact with the physical world via a set of sensors and actuators, have their own computati...
The imminent mass deployment of pervasive computing technologies such as sensor networks and RFID tags, together with the increasing participation of the Web community in feeding ...
Gabriella Castelli, Alberto Rosi, Marco Mamei, Fra...
Mobile agent technology has traditionally been recognized as a very useful approach to build applications for mobile computing and wireless environments. However, only a few studie...