Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
—Delay Tolerant Networks are wireless networks where disconnections may occur frequently due to propagation phenomena, node mobility, and power outages. Propagation delays may al...
Amir Krifa, Chadi Barakat, Thrasyvoulos Spyropoulo...
— Security is emerging as an important requirement for a number of distributed applications such as online banking, social networking etc. due to the private nature of the data b...
—The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key m...
: This paper presents an authorization solution for resource management and control developing as a part of the China Education and Research Network (CERNET) to perform fine-graine...