A novel protocol is proposed to address the problem of user authentication to smartcards using biometric authentication instead of the usual PIN. The protocol emulates expensive Ma...
Stefano Bistarelli, Stefano Frassi, Anna Vaccarell...
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Abstract--Troubleshooting of wireless networks is a challenging network management task. We have developed, in a previous work, a new troubleshooting methodology, which we named St...
— Performing face detection and tracking on a mobile robot in a dynamic environment is a challenging task with the real-time constraints. To realize a natural reactive behavior o...
Abstract-- The next generation of computers will be embossed by ubiquitous systems. The computer will disappear behind daily artifacts and will support people in their everyday lif...
Faruk Bagci, Julian Wolf, Theo Ungerer, Nader Bagh...