An increasing amount of personal data is automatically gathered on servers by administrations, hospitals and private companies while several security surveys highlight the failure...
Nicolas Anciaux, Luc Bouganim, Yanli Guo, Philippe...
The protocol design for wireless roaming authentication is challenging because of the key management regarding users and home/visited networks. In this paper, we present two authe...
Abstract-- Information about the topology and link-level characteristics of a network is critical for many applications including network diagnostics and management. However, this ...
In 2001, Rivest et al. rstly introduced the concept of ring signatures. A ring signature is a simplied group signature without any manager. It protects the anonymity of a signer....
Web service composition (WSC) techniques assume that the parameters used to model the environment remain static and accurate throughout the composition's execution. However, W...