Security of mobile communications comes with the cost of computational overhead. Reducing the overhead in security computations is critical to ensure the overall performance of a ...
A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually, one ‘‘group key’’ is shared by all approved members. Ho...
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Recent developments in the field of object-based fault tolerance and the advent of the first OMG FTCORBA compliant middleware raise new requirements for the design process of dist...
In this paper we present a new cache maintenance scheme, called AS, suitable for wireless mobile environment. Our scheme integrates mobility management scheme of Mobile IP with ca...
Anurag Kahol, Ramandeep Singh Khurana, Sandeep K. ...