The increasing complexities of modern networks coupled with the popularity of multimedia applications have placed higher demands on network managers. This paper reviews the main r...
The demand for network-enabled limited-footprint mobile devices is increasing rapidly. A central challenge that must be addressed in order to use these next-generation devices eff...
This paper presents a time bounded real-time agent, the core of a Multi-agent System aimed at managing the security in manufacturing environments, where time constraints are a key ...
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...