Abstract. With the development of the multicast technology, the realtime strategy among the group applications using the multicast routing is getting more important. An essential f...
Youngjin Ahn, Moonseong Kim, Young-Cheol Bang, Hyu...
Abstract. We introduce a new undeniable signature scheme which is existentially unforgeable and anonymous under chosen message attacks in the standard model. The scheme is an embed...
We describe a method for indexing and retrieving high-resolution image regions in large geospatial data libraries. An automated feature extraction method is used that generates a u...
Kenneth W. Tobin, Budhendra L. Bhaduri, Eddie A. B...
Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation atta...
We present two left-to-right integer recodings which can be used to perform scalar multiplication with a fixed sequence of operations. These recodings make it possible to have a s...