Learn More
The threat of possible malicious activities that can be executed by adversaries impedes the rapid deployment of wireless networks. Researchers and scientists have rendered various mechanisms in order to preclude or at least mitigate such activities. Many of these strategies necessitate or presume the presence of a trusted authority to actualize their(More)
Mobile wireless networks have fascinating characteristics of rapid deployment and network connectivity anywhere and anytime. Due to their very nature of being mobile, grievous security issues may arise, for which some homogeneous solutions have already been proposed. However, each node may have its own security requirements depending on the available(More)
An important aspect when implementing haptic system is to resemble as closely as possible the specific real world haptic sensation the feedback is trying to mimic. System designers have used various techniques to improve realism of such sensation. One of the approaches is by involving haptic feedback analysis that employs visualization of haptic sensation.(More)
Security and privacy threats in technological environment are great hindrances to use latest technologies for our benefits. Such threats also exist in RFID systems which are currently utilized to a great extent in ubiquitous communication. These systems can also work in combination with cellular networks to control user's physical objects in a secure way(More)
  • 1