The paper proposes ways to counter the Cyber Terrorist (CT) advantages of surprise and anonymity. It recommends the creation of a Cyberint Analysis Center to develop and evaluate ...
This paper introduces a novel reprocessingtransaction model that handles the update conflicts between mobile transactions without abortion. The proposed model executes a new subtr...
Donghyun Kim, Bonghee Hong, Byunggu Yu, Eun Suk Ho...
In 2000, Joux proposed a one-round protocol for tripartite Diffie-Hellman. In 2003, Shim presented an efficient one-round tripartite authenticated key agreement protocol based on ...
In this paper, the IEEE 802.11 multiple access control protocol was modified for use in multi-channel, multi-hop ad hoc network, through the use of a new channel-status indicator....
Jiandong Li, Zygmunt J. Haas, Min Sheng, Yanhui Ch...
In 1994, Harn proposed a signature scheme based on the modified ElGamal's scheme and claimed that the security relies on both of the factorization and the discrete logarithm....