We study the transmission strategy for a system consisting of two pairs of two-way communication links. The information exchange between the two nodes in each pair can only occur w...
We analyze the Extended Access Control (EAC) protocol for authenticated key agreement, recently proposed by the German Federal Office for Information Security (BSI) for the deploym...
Abstract. Research in context-aware systems shows that using context information enables the development of personalized mobile applications. The context acquisition process in a c...
Tom Broens, Aart van Halteren, Marten van Sinderen
XML is a popular approach to interoperable exchange of Multimedia metadata between a wide range of devices. This paper explores extending the use of the Remote XML Exchange Protoc...
Development of a software system from existing components can surely have various benefits, but can also entail a series of problems. One type of problems is caused by a limited ...