Abstract. Traditionally, cryptographic protocols are described as a sequence of steps, in each of which one principal sends a message to another. It is assumed that the fundamental...
In mobile agent systems, program code together with some process state can autonomously migrate to new hosts. Despite its many practical benefits, mobile agent technology results i...
Shimshon Berkovits, Joshua D. Guttman, Vipin Swaru...
Cooperation enforcement is one of the key issues in ad hoc networks. In this paper we proposes a new strategy driven approach that aims at discouraging selfish behavior among netwo...
Marcin Seredynski, Pascal Bouvry, Mieczyslaw A. Kl...
Existing approaches to knowledge representation and reasoning in the context of open systems either deal with "objective" knowledge or with beliefs. In contrast, there ha...
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts hav...