Abstract-- UWB and 802.11n have both been touted as technologies for next generation wireless networks. UWB exploiting a large bandwidth, and 802.11n utilizing MIMO, demonstrate hi...
Arjunan Rajeswaran, Gyouhwan Kim, Rohit Negi, Sai ...
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Abstract. Simulating and controlling physiological phenomena are complex tasks to tackle. This is due to the fact that physiological processes are usually described by a set of par...
The security of software applications is an important domain, and one that mixes formalisms (e.g. when dealing with cryptography and security protocols) with very ad hoc, low level...
Large corporations increasingly utilize business process models for documenting and redesigning their operations. The extent of such modeling initiatives with several hundred mode...