In recent years, several trust and reputation models have been proposed to enhance the security of mobile ad hoc networks. However, they either fail to capture evidence of trustwo...
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
While mobile computing provides a potentially vast business opportunity for many industry participants, it also raises issues such as security and performance. This paper proposes...
The goal of secure multiparty computation is to transform a given protocol involving a trusted party into a protocol without need for the trusted party, by simulating the party am...
Most existing Grid technology has been foremost designed with performance and scalability in mind. When using Grid infrastructure for medical applications, privacy and security co...