We initiate the study of security for key-dependent messages (KDM), sometimes also known as “circular” or “clique” security, in the setting of identity-based encryption (I...
Computational e-mail systems, which allow mail messages to containcommandscripts that automaticallyexecute upon receipt, can be used as a basis for building a variety of collabora...
Elliptic curve cryptography is known for its complexity due to its discrete logarithm problem, and this gives advantage to the system used since the formula developed using this c...
Service-based systems have many applications, such as collaborative research and development, e-business, health care, military applications, and homeland security. In dynamic ser...
Stephen S. Yau, Haishan Gong, Dazhi Huang, Wei Gao...
Web services security specifications are typically expressed as a mixture of XML schemas, example messages, and narrative explanations. We propose a new specification language fo...