The three-party password-based key exchange protocols using Weil pairing proposed by Wen is vulnerable to impersonation attack. By introducing hard artificial intelligence problem...
ic copy available at: http://ssrn.com/abstract=1682187 Massachusetts Institute of Technology Department of Economics Working Paper Series Opinion Fluctuations and Disagreement in S...
This paper deals with broadcasting in a network with t-locally bounded Byzantine faults. One of the simplest broadcasting algorithms under Byzantine failures is referred to as a c...
We present a risk management framework which allows to reason about and manage risk for role based access control systems. The framework expresses essential characteristics of risk...
Biogeography-based optimization (BBO) is a new evolutionary algorithm based on the science of biogeography. We propose two extensions to BBO. First, we propose blended migration. ...