The paper analyzes CFVZ, a new public key cryptosystem whose security is based on a matrix version of the discrete logarithm problem over an elliptic curve. It is shown that the co...
Most of the current security architectures for grid systems use conventional public key infrastructure (PKI) to authenticate grid members and to secure resource allocation to thes...
In many parts of the world there is a growing demand for participation in public policy decision making. This demand could be satisfied by the design and deployment of webbased gr...
This paper proposes that social network data should be assumed public but treated private. Assuming this rather confusing requirement means that anonymity models such as kanonymity...
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional cor...