The current trend in mobile networking is towards mobile hosts that have multiple network interfaces, e.g., WLAN and GPRS. However, when the current Internet architecture was orig...
The functionality of extensible database servers can be augmented by user-de ned functions UDFs. However, the server's security and stability are concerns whenever new code...
Michael W. Godfrey, Tobias Mayr, Praveen Seshadri,...
Essentially all work studying the round complexity of secure computation assumes broadcast as an atomic primitive. Protocols constructed under this assumption tend to have very poo...
The principle of information security safeguards is a key information principle contained in every privacy legislation measure, framework, and guideline. This principle requires d...
A nominative signature scheme allows a nominator (i.e. the signer) and a nominee (i.e. a designated verifier) to jointly generate and publish a signature so that only the nominee ...