We extend the well-known Tree-Diffie-Hellman technique used for the design of group key exchange (GKE) protocols with robustness, i.e. with resistance to faults resulting from poss...
Secure group communication protocols have been designed to meet needs such as secure management of group membership, confidential group communication, and access control. New lan...
Graph-based formalisms of quantum computation provide an abstract and symbolic way to represent and simulate computations. However, manual manipulation of such graphs is slow and e...
Abstract. This text motivates and de nes a generic model for interactive online or o ine product catalogs. Based on a detailed requirements analysis, the data model is de ned usi...
Mobile code computation has lead to a new paradigm of distributed computation. A mobile process can move from site to site and interact with the resources as a local process. To p...