Data flow process networks are a good model of computation for streaming multimedia applications incorporating audio, video and/or graphics streams. Process networks are concurre...
We provide methods for transforming an encryption scheme susceptible to decryption errors into one that is immune to these errors. Immunity to decryption errors is vital when const...
Abstract. This work presents a new privacy primitive called “Traceable Signatures”, together with an efficient provably secure implementation. To this end, we develop the unde...
For the last two decades the notion and implementations of proxy signatures have been used to allow transfer of digital signing power within some context (in order to enable flexi...
With the rapid growth of emerging demand and deployment of wireless LAN (WLAN), much of traffic including multimedia traffic is forced to travel over WLAN. Since the legacy IEEE 80...
Sang-Hee Park, Hye-Soo Kim, Chun-Su Park, Kyunghun...