We propose the idea of building a secure hash using quadratic or higher degree multivariate polynomials over a finite field as the compression function. We analyze some security ...
In a distributed system with N processes, time stamps of size N (such as vector clocks) are necessary to accurately track potential causality between events. Plausible clocks are a...
— Smart Diagram Environments (SDEs) are software applications that use structured diagrams to provide a natural visual interface that behaves as if the computer “understands”...
— We consider a scenario where an application service provider (ASP) hires a network service provider (NSP) to deliver its service and pays for the employment of the NSP. We stud...
During the different phases of a project, stakeholders have different communication needs and make use of different communication media to satisfy them. A group memory system must...