SASC (Server-Aided Secret Computation) protocols enable a client (a smart card) to borrow computing power from a server (e.g., an untrustworthy auxiliary device like an ATM) witho...
Heeyoul Kim, Younho Lee, Seong-Min Hong, Hyunsoo Y...
Mobile IP has been defined by Third Generation Partnership Project 2(3GPP2) to be the mobility solution for the next generation cellular networks. The Mobile IP related issues th...
Lin-Huang Chang, Che Lin Lo, Jui Jen Lo, Wei-Ting ...
The ability of communicating with a selected party anonymously is an important aspect of network security. Communicating anonymously means that no adversary can discern who is com...
In 2001, Rivest et al. rstly introduced the concept of ring signatures. A ring signature is a simplied group signature without any manager. It protects the anonymity of a signer....
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...