Recently, a receipt-free scheme is rising for a secure eauction. The goal of a receipt-free scheme in an eauction is to prevent a bid-rigging. If the bid-rigging happens in the e-...
Authentication and key distribution protocols that utilize weak secrets (such as passwords and PINs) are traditionally susceptible to guessing attacks whereby an adversary iterate...
Fair exchange turns out to be an increasingly importanttopic due to the rapid growth of electronic commerce. An exchange is deemed to be fair if at the end of exchange, either each...
In this paper we study relations which are congruences with respect to and p, where pis the p-cut of the L-fuzzy hyperoperation . The main idea is to start from an equivalence re...
This paper claims that in its current use the term ‘network’ represents no more than a suggestive image of organizing in an age of spectacular context-crossing electronic tran...