Vehicular ad hoc networks (VANETs) are envisioned to provide us with numerous interesting services in the near future. One of the most promising applications is the dissemination ...
Suk-Bok Lee, Gabriel Pan, Joon-Sang Park, Mario Ge...
In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for...
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan ...
The emerging reality of wireless sensor networks deployed as long-lived infrastructure required to serve multiple applications necessitates the development of fine-grained securi...
Nelson Matthys, Syed Rehan Afzal, Christophe Huyge...
P2P systems inherently have high scalability, robustness and fault tolerance because there is no centralized server and the network self-organizes itself. This is achieved at the ...
This paper explores the problem of protecting a site on the Internet against hostile external Java applets while allowing trusted internal applets to run. With careful implementat...
David M. Martin Jr., Sivaramakrishnan Rajagopalan,...