The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect th...
This paper presents a new personal data access control (PDAC) scheme that is inspired by the protection schemes practiced in communities for sharing valuable commodities. The PDAC...
: In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation betw...
Abstract—Discovery biological organisation of the cell in modules network is a challenging task. Currently, approaches based on a controlled vocabulary, as Gene Ontology, to iden...
Alessia Visconti, Francesca Cordero, Marco Botta, ...
Despite a high level of activity and a large number of researchers involved, current research in data mining is plagued with several serious problems that should be regarded as to...