— Legacy systems that do not conform to the norms and regulations imposed by recent safety standards have to be upgraded to meet safety requirements. In this paper, we describe a...
The standard digital signature scheme can be easily subject to key exposure problem In order to overcome this problem; a feasible and effective approach is employed by key-evolving...
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have ...
— The Complex Logarithmic Number System (CLNS) uses log/polar complex representation. We propose CLNS for the 128-point Fast Fourier Transform (FFT) in Orthogonal Frequency Divis...
Panagiotis D. Vouzis, Mark G. Arnold, Vassilis Pal...
With the advent of Web services and orchestration specifications like BPEL it is possible to define workflows on an Internet-scale. In the health-care domain highly structured and ...