Abstract. This paper investigates the security of Proactive Secret Sharing Schemes. We start with revision of the mobile adversary model of Herzberg’s et al. imposing less restri...
The popularity of mobile devices has propelled the development of many useful location-aware applications. However, the heterogeneity of mobile devices necessitates that the softw...
The objective of this paper is to study how a software product company can expand its productbased business with the Software as a Service (SaaS) model into the mobile setting. We...
Abstract—Existing solutions for building wireless mesh networks suffer from reduced efficiency. This is due to lack of reliable self-configuration procedures that can dynamical...
Mobile infrastructure consists of one or more sensors in a fixed configuration on a mobile platform. By moving the mobile platform in the environment and attaching a set of stat...