The current Internet is based on a stateless (datagram) architecture. However, many recent proposals rely on the maintenance of state information within network routers, leading t...
Privacy refers to controlling the dissemination and use of personal data, including information that is knowingly disclosed, as well as data that are unintentionally revealed as a ...
—The access of information systems to underlying relational databases is commonly programmed using embedded SQL queries. Such embedded queries may take the form of string literal...
Huib van den Brink, Rob van der Leek, Joost Visser
By shifting the burden of proofs to the user, a proof-carrying authorization (PCA) system can automatically enforce complex access control policies. Unfortunately, managing those p...
— A novel smart antenna is described, which is conceived as a low complexity inexpensive upgrade for IEEE 802.11b/g Wireless Local Area Network (WLAN) systems. Using smart antenn...
Timothy J. Harrold, Dean C. Kemp, Mark A. Beach, C...