Using certificates for distributed authorizations in computer network systems has been discussed in the literature. However real implementations of the concept are rarely seen. In...
— In this paper we realize a real-time communication on Ethernet and develop an onbody distributed control system for a humanoid robot, HRP-3P. Real-time communication on Etherne...
This paper presents a low-cost and secure authentication protocol to reduce the computational load on both the back-end database and the tags in a distributed RFID system. The prop...
JaeCheol Ha, Hwankoo Kim, JeaHoon Park, Sang-Jae M...
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
Component-based software development would allow application software be largely constructed, rather than programmed. This approach would dramatically improve the productivity of ...