Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Data intensive applications on clusters often require requests quickly be sent to the node managing the desired data. In many applications, one must look through a sorted tree str...
In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a different associated access structure. We consider here un...
— The recent ECMA-368 standard specifies the use of ultra wideband (UWB) technology for high rate communications in wireless personal area networks (WPANs). This paper proposes ...
Nasim Arianpoo, Yuxia Lin, Vincent W. S. Wong, Att...
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...