A `pragmatic' alternative to undetachable signatures is proposed. Undetachable signatures were introduced by Sander and Tschudin, [4], as a means of giving a mobile agent the...
Threshold signature schemes are examples of threshold cryptosystems, as introduced by Desmedt, [4]. The purpose of this paper is to present a rather simple alternative to threshol...
Abstract - Active Networking is a new technology receiving significant attention from the research community. To this point, however, it has not been examined from the perspective...
Stuart Eichert, Osman N. Ertugay, Dan M. Nessett, ...
—Cloud computing provides us with general purpose storage and server hosting platforms at a reasonable price. We explore the possibility of tapping these resources for the purpos...
This paper proposes a new storage model, device transparency, in which users view and manage their entire data collection from any of their devices, even from disconnected storage...
Jacob Strauss, Chris Lesniewski-Laas, Justin Mazzo...