Effective privacy management requires that mobile systems‟ users be able to make informed privacy decisions as their experience and knowledge of a system progresses. Prior work ...
Lukasz Jedrzejczyk, Blaine A. Price, Arosha K. Ban...
We propose and analyze a scalable and efficient region-based group key management protocol for secure group communications in mobile ad hoc networks. For scalability and dynamic r...
High security network transactions require the checking of the revocation status of public key certificates. On mobile systems this may lead to excessive delays and unacceptable p...
This paper presents an auction system based on mobile agents. By using a proxy server, a user can generate a mobile auction agent by giving the bidding information, including the ...
Business Process Management (BPM) is often a key component of the business change. Business rules, whether embedded within BPM or on their own, have begun playing an ever-increasi...