Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
We present a decentralized authorization architecture based on capabilities in which parties are able to exercise full control over their resources or delegate it in an ad-hoc man...
Feike W. Dillema, Simone Lupetti, Tage Stabell-Kul...
Ultra Wide Band (UWB) technologies have attracted a lot of attention recently due to their large bandwidth and low emission, which are suitable for in-door, high-speed multimedia c...
In this paper, we address the problem of cross-layer optimization in medium access control (MAC) and network layers for wireless multicasting with multiple cooperative or competit...
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...