Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
Current online stores suffer from a cardinal problem. There are too many products to offer, and customers find themselves lost due to the vast selection. As opposed to traditional ...
Knowledge is an important matter for consulting firms − as a resource, as a product or service, and as a trigger for internal value creation processes. Therefore, a strategy for...
Sven Grolik, Dirk Kalmring, Dietrich Lehner, Chiar...
The Personal Reader1 provides a framework for designing, implementing and maintaining web content readers, which provide personalized enrichment of web content for each individual...
Abstract. Academic and commercial 802.11 hotspots often use an SSLsecured captive portal to authenticate clients. Captive portals provide good usability and interoperability, but p...