For the most compelling applications of threshold cryptosystems, security against chosen ciphertext attack is a requirement. However, prior to the results presented here, there ap...
This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resis...
—Vehicle dispatching consists of allocating real-time service requests to a fleet of moving vehicles. In this paper, each vehicle is associated with a vector of attribute values...
In this paper we give a general definition of weighted fairness and discuss how a pricing policy can be mapped to general weighted (GW) fairness. The GW fairness can be achieved b...
Bobby Vandalore, Sonia Fahmy, Raj Jain, Rohit Goya...
Symbol Technologies has completed a unique accomplishment; it has created a commercially successful Wearable Computer. The success of this product is directly due to a structured ...
Robert Stein, Stephen Ferrero, Margaret Hetfield, ...