For most basic cryptographic tasks, such as public key encryption, digital signatures, authentication, key exchange, and many other more sophisticated tasks, ideal functionalities...
In 2004, Yoon et al. proposed a user authentication scheme based on generalized ElGamal signature scheme using smart cards. In their scheme, the previous session keys will be comp...
A Data Sharing Agreement (DSA) is a contract among two or more principals regulating how they share data. Agreements are usually represented as a set of clauses expressed using the...
Alvaro E. Arenas, Benjamin Aziz, Juan Bicarregui, ...
—This paper discusses multi-issue negotiation between agents such as providers and consumers in a group decision making environment. The outcome of such encounters depends on two...
Fahmida Abedin, Kuo-Ming Chao, Nick Godwin, Hisbel...
Abstract. Today, e-commerce transactions are typically protected using SSL/TLS. However, there are risks in such use of SSL/TLS, notably threats arising from the fact that informat...