In this paper, we discuss the recent ESG’s development and implementation efforts concerning its authentication infrastructure. ESG’s requirements are to make the user’s log...
Frank Siebenlist, Rachana Ananthakrishnan, David E...
The inherent difficulty in supporting human usability in large control systems--such as building environmental and security systems--derives from the large diversity of components...
Robin R. Penner, Erik S. Steinmetz, Christopher L....
Providing location-aware services to mobile users comes with an inherent service-degrading data management problem for which the location-aware linkcell-based data management meth...
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
In emergency scenarios we can obtain a more effective coordination among team members constituting a mobile ad hoc network (MANET) through the use of reconfigurable systems. This ...