This paper addresses design exploration for protocols that are employed in systems with availability-consistency tradeoffs. Distributed data is modelled as states of objects repl...
Currently, access to Grid services is limited to resourceful devices such as desktop PCs but most mobile devices (with wireless network connections) cannot access the Grid network ...
Hassan Jameel, Umar Kalim, Ali Sajjad, Sungyoung L...
Token-controlled public key encryption (TCPKE) schemes, introduced in [1], offer many possibilities of application in financial or legal scenarios. Roughly speaking, in a TCPKE s...
: Access to Grid services is currently limited to devices having significant computing, network resources etc. such as desktop computers. On the other hand, most of mobile devices ...
Ali Sajjad, Hassan Jameel, Umar Kalim, Young-Koo L...
We investigate efficient protocols for password-authenticated key exchange based on the RSA public-key cryptosystem. To date, most of the published protocols for password-authentic...