Abstract. Credential platforms implemented on top of Trusted Execution Environments3 (TrEEs) allow users to store and use their credentials, e.g., cryptographic keys or user passwo...
Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ek...
The ability to generate discrete movement with distinct and stable time courses is important for interaction scenarios both between different robots and with human partners, for ca...
Matthias Tuma, Ioannis Iossifidis, Gregor Schö...
The recent evolution in mobile devices, combined with rapid advancements in identification techniques, has lead to new opportunities for mobile application developers: mobile appli...
William Van Woensel, Sven Casteleyn, Olga De Troye...
—In this paper, we present mobile agent systems supporting persistency. In order to develop the mobile agent systems, a mobile agent framework has to have functions to support pe...
—Today’s mobile networks prevent users from freely accessing all available networks. Instead, seamless network composition could present a win-win situation for both users and ...
Pongsakorn Teeraparpwong, Per Johansson, Harsha V....