Ubiquitous application software usually has multiple QoS requirements, such as situationawareness, real-time, and security, which make the application software development complic...
In this paper, we argue that person-to-person key distribution is best accomplished with a key-centric approach, instead of PKI: users should distribute public key fingerprints in...
Customers of public computing sites and faculty who use the public computer classrooms to teach want diversity in computing. Inevitably, there’s a group that does not want to te...
Abstract. We explore three applications of geometric sequences in constructing cryptographic Boolean functions. First, we construct 1-resilient functions of n Boolean variables wit...
Key exposures, known or inconspicuous, are a real security threat. Recovery mechanisms from such exposures are required. For digital signatures such a recovery should ideally —an...