We consider the problem of cooperative intrusion detection in wireless sensor networks where the nodes are equipped with local detector modules and have to identify the intruder in...
Ioannis Krontiris, Zinaida Benenson, Thanassis Gia...
A mobile agent is regarded as an attractive technology when developing distributed applications in mobile and ubiquitous computing environments. In this paper, we present ODDUGI, a...
—Software license management allows independent software vendors (ISVs) to control the access of their products. It is a fundamental part of the ISVs’ business strategy. A wide...
—In the modern car, electronic devices are even employed for safety-critical missions like brake control, where failures might cost human lives. Among various approaches to incre...
Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domai...