We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
This paper presents a discussion of the issues relating to the selection of encryption algorithms in practical situations. An AES standard which recommends multiple algorithms in ...
We analyze a general market for an industry of competing service facilities. Firms differentiate themselves by their price levels and the waiting time their customers experience,...
The electronic court proceedings would provide many advantages: reducing time of justice, such a method to promote ease of transport, facilitating the drafting of subsequent judge...
Industry recognizes that very small enterprises (VSE), that develop parts involving software components are very important to the economy. These parts are often integrated into pro...