In the course of making electronic services and facilities more widely accessible and usable, more and more IT systems are incorporating smart cards as a component. We analyzes the...
SESAME is a security architecture that starts from the Kerberos protocol and adds to it public-key based authentication, role based access control, delegation of rights and an ext...
Paul Ashley, Mark Vandenwauver, Mark Rutherford, S...
: Bugs in network application program can be exploited to compromise the system on which the application is running. When running these applications in an unsafe environment such a...
In future smart environments, ad hoc sensor networks will play a key role in sensing, collecting, and disseminating information about environmental phenomena. As sensor networks c...
Contemporary vehicles offer an advanced telematics platform with multiple applications available such as electronic road tolling, emergency call, breakdown call, or route planning....
Jef Maerien, Sam Michiels, Stefan Van Baelen, Chri...