Interactive access control allows a server to compute and communicate on the fly the missing credentials to a client and to adapt its responses on the basis of presented and decli...
The most studied property, secrecy, is not always sufficient to prove the security of a protocol. Other properties such as anonymity, privacy or opacity could be useful. Here, we u...
Abstract. This papers presents new Global Positioning System (GPS)based route discovery algorithms for on-demand routing in MANETs, called Position-based Selective Flooding (PSF). ...
Wireless network research still lacks methods to integratively evaluate the performance that can be expected from application layer protocols. The user behavior is predominantly aï...
Tobias Breyer, Michael Klein, Philipp Obreiter, Bi...
Abstract. Flexible personal communications may require dynamically discovering, using, and combining a number of services to support the activities of a mobile user. However, many ...