Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental primitives in modern cryptography, allowing a group of mutually distrustfu...
To help users cope with information overload, Selective Dissemination of Information SDI will increasingly become an important tool in wide area information systems. In an SDI ser...
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
P2P systems have witnessed phenomenal development in recent years. Evaluating and analyzing new and existing algorithms and techniques is a key issue for developers of P2P systems...
Tien Tuan Anh Dinh, Georgios K. Theodoropoulos, Ro...
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...