When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
In this paper we propose a new metaphor of information retrieving, usable in heritage management and publishing. Based on the net, the user is able to participate in virtual guide...
Dorin Mircea Popovici, Serge Morvan, Eric Maisel, ...
The work of the Open Hypermedia Systems Working Group (OHSWG) has lead to the creation of several hypermedia models and a common protocol for Navigational Hypertext. However none o...
Danius T. Michaelides, David E. Millard, Mark J. W...
—This paper presents a group-based security scheme for distributed wireless sensor networks. The scheme is proposed with 3-types of entities: one or more base stations, Y number ...
Md. Abdul Hamid, Md. Mustafizur Rahman, Young Yig ...
Email has become overloaded as users make use of email tools for performing a wide range of activities. Previous studies have demonstrated the different strategies employed by ema...