Despite a legal framework being in place for several years, the market share of qualified electronic signatures is disappointingly low. Mobile Signatures provide a new and promisin...
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Individual, unaided human abilities are constrained. Media have helped us to transcend boundaries in thinking, working, learning, and collaborating by supporting distributed intel...
Collaborative capabilities are a hallmark of a new generation of networked applications. While traditional collaboration puts the computer in the foreground to help users interfac...
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...