In this paper we discuss PRNGs: the mechanisms used by real-world secure systems to generate cryptographic keys, initialization vectors, "random" nonces, and other values...
John Kelsey, Bruce Schneier, David Wagner, Chris H...
Abstract: Since mobile user mobility behaviors can vary according to time periods, e.g. office-going/closing and office hours, the location management traffic load for tracking ...
Min Young Chung, Tai Suk Kim, Ho Shin Sho, Dan Keu...