: With increasing number of pathways available in public databases, the process of inferring gene regulatory networks becomes more and more feasible. The major problem of most of t...
Christian Spieth, Felix Streichert, Nora Speer, An...
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). IBE is a public key cryptosystem where a public key is an arbitrary strin...
Abstract An encryption scheme is non-malleable if the adversary cannot transform a ciphertext into one of a related message under the given public key. Although providing a very st...
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Senior executives in public sector organisations have been charged with delivering an e-Government agenda. A key emerging area of research is that of the evaluation of e-Governmen...
Stephen Jones, Zahir Irani, Amir M. Sharif, Marino...