The popular models for repairable item inventory, both in the literature as well as practical applications, assume that the demands for items are independent of the number of work...
Hoong Chuin Lau, Huawei Song, Chuen Teck See, Siew...
Peer-to-peer content distribution provides high network throughput with relatively low server cost and scales better than traditional content distribution networks with respect to...
In a proxy re-encryption (PRE) scheme [4], a proxy, authorized by Alice, transforms messages encrypted under Alice's public key into encryptions under Bob's public key w...
Jian Weng, Robert H. Deng, Xuhua Ding, Cheng-Kang ...
With web services emerging as a promising technology for supporting open and dynamic business processes, it is witnessed that standards for business process specification in the c...
Safe long-term storage of user private keys is a problem in client/server systems. The problem can be addressed with a roaming system that retrieves keys on demand from remote cred...