We provide an alternative method for constructing lattice-based digital signatures which does not use the “hash-and-sign” methodology of Gentry, Peikert, and Vaikuntanathan (ST...
To increase the security of handheld devices, we propose awareLESS authentication. Since insensible input prevents the leakage of the key information, it can provide more secure a...
Abstract In this paper, an agent based WLAN/cellular network integrated service model and relevant authentication scheme is proposed. The service model, or solution, does not r...
Minghui Shi, Humphrey Rutagemwa, Xuemin Shen, Jon ...
In 1990, Boyar, Chaum, Damg˚ard and Pedersen introduced convertible undeniable signatures which limit the self-authenticating property of digital signatures but can be converted b...
Firewalls typically filter network traffic at several different layers. At application layer, filtering is based on various security relevant information encapsulated into proto...