Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal wit...
It is well known that, in theory, the general secure multiparty computation problem is solvable using circuit evaluation protocols. However, the communication complexity of the re...
How can Alice trust computation occurring at Bob's computer? Since it exists and is becoming ubiquitous, the current-generation TCPA/TCG hardware might enable a solution. Whe...
John Marchesini, Sean W. Smith, Omen Wild, Joshua ...
Many applications in eLearning utilize wireless networks (WLAN) as a carrier for data and communication. These networks in their basic form are insecure, protecting the communicat...