Recently, Wang et al. proposed a set of double auction protocols with full privacy protection based on distributed ElGamal encryption. Unfortunately, their protocols are expensive ...
The trend of the networking processing is to increase the intelligence of the routers (i.e. security capacities). This means that there is an increment in the workload generated p...
Probabilistic model checking is a formal verification framework for systems which exhibit stochastic behaviour. It has been successfully applied to a wide range of domains, includ...
— Large scale wireless sensor networks (WSNs) can be used for various pervasive and ubiquitous applications such as security, health-care, industry automation, agriculture, envir...
Abstract— Today electronic messaging services are indispensable to individuals and organizations. If a message contains sensitive information, the integrity and confidentiality ...