Abstract. The hash algorithm forms the basis of many popular cryptographic protocols and it is therefore important to find throughput optimal implementations. Though there have be...
This paper introduces a context-aware authorization architecture that is designed to augment existing network security protocols in an Intranet environment. It describes the archi...
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
paper, the unified, abstract KEYSTONE Public Key Infrastructure is presented.This architecture consists of a reference model, a functional architecture specification, and a set of ...
Stefanos Gritzalis, Sokratis K. Katsikas, Dimitrio...
Enabling people-to-people interaction across heterogeneous communication end-points enhances user experience and fosters people collaboration. This paper presents the design and i...