The idea of risk permeates the information security field. We use terms like ``risk management'', ``risk assessment'', ``risk model'' and ``risk analy...
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...
Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accele...
The continuous technical advances have lead to the proliferation of very small and very cheap microprocessors, equipped with sensors and capacity of wireless communication. The in...
Abstract. In this paper, we propose a novel solution called joint encryption, in which audio and video data are scrambled efficiently by using modified phase scrambling, modified...
Goo-Rak Kwon, Tea-Young Lee, Kyoung-Ho Kim, Jae-Do...