In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
We propose a key generation method for RSA moduli which allows the cost of the public operations (encryption/verifying) and the private operations (decryption/signing) to be balanc...
Steven D. Galbraith, Chris Heneghan, James F. McKe...
Organizations involving multiple agents require adaptation mechanisms to guarantee robustness, especially in critical domains. This paper presents an organizational template to ai...
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting, auction, identity-based encryption, and certain forms of secure multi-party computation,...
Creation of an Outpatient Procedure Center (OPC) is a complicated endeavor, requiring a detailed understanding of the resources available and the procedures to be performed. Misca...
Todd R. Huschka, Brian T. Denton, Bradly J. Narr, ...