Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing...
Security in collaborative groups is an active research topic and has been recognized by many organizations in the past few years. In this paper, we propose a fine-grained and attr...
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
With an increasing number of devices that must be managed, the scalability of network and service management is a real challenge. A similar challenge seems to be solved by botnets ...
—A central challenge facing sensor network research and development is the difficulty in providing effective autonomous management capability. This is due to a large number of p...
Antonio G. Ruzzelli, Conor Muldoon, Anthony Schoof...