Smart dust motes are miniature self-contained systems that may be deployed in very large numbers. In military applications these devices are subject to different threats than conv...
A reparable database management system has the ability to automatically undo the set of transactions that are corrupted by a human error or malicious attack. The key technical chal...
The Information Technology (IT) governance arrangements refer to the patterns of authority for key IT activities in organizations, including IT infrastructure, IT use, and project...
Fatemeh NasserEslami, Mehdi Fasanghari, H. R. Khod...
The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification au...
Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Ros...
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...