Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the security of key-insulated protocols, Hanaoka, Hanaoka and Imai recently i...
—Several dynamic call admission control (CAC) schemes for cellular networks have been proposed in the literature to reserve resources adaptively to provide the desired quality of...
— A key function for network traffic monitoring and analysis is the ability to perform aggregate queries over multiple data streams. Change detection is an important primitive w...
Robert T. Schweller, Zhichun Li, Yan Chen, Yan Gao...
Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delega...
—Most existing multiview video coding (MVC) techniques are based on the traditional hybrid DCT-based video coding schemes, e.g., MPEG-2, MPEG-4 and H.264. They neither fully expl...
Wenxian Yang, Feng Wu, Yan Lu, Jianfei Cai, King N...