Many of today’s proposed RFID privacy schemes rely on the encryption of tag IDs with user-chosen keys. However, password management quickly becomes a bottleneck in such proposals...
Background. This research group has been working towards building an environment which helps software development, providing support to some activities mainly based on use case mo...
A coalition provides a virtual space across a network that allows its members to interact in a transparent manner. Coalitions may be formed for a variety of purposes. These range ...
Abstract— In this paper, we propose a distributed opportunistic access scheme for uplink OFDMA systems. The sub-carriers are grouped into several sub-channels. Users access these...
Mobile clients feature increasingly sophisticated wireless networking support that enables realtime information exchange with remote databases. Location-dependent queries, such as...