In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key in...
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Output-based feedback control of discrete-time hybrid systems is an important problem, as in practice it is rarely the case that the full state variable is available for feedback. ...
Maurice Heemels, Mircea Lazar, Nathan van de Wouw,...
With the amount of unsolicited emails on the rise, domain authentication schemes have been widely deployed to identify senders. Establishing a sender's identity does not guar...
Volunteer Computing (VC) is a paradigm that takes advantage of idle cycles from computing resources donated by volunteers and connected through the Internet to compute large-scale...