: The integration of information systems is not a new challenge. As one instrument, standards provide interfaces for integrated information systems. With regard to the recent adven...
Markus Bick, Tyge Kummer, Jan M. Pawlowski, Patric...
One motivation of mobile Next-Generation Networks (NGN) is the ubiquitous computing abilities, which provide automatic handovers for any moving computing devices in a globally net...
To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent among sensor nodes. Keys for encryption and authentication pu...
Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod ...
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
Abstract--Reliable and secure content distribution in a disruptive environment is a critical challenge due to high mobile and lossy channels. Traditional IP networking and wireless...