Delegation of rights is a common practice in the real world. Proxy signature schemes have been invented to delegate signing capability eeciently and transparently. In this paper, we present a new nonrepudiable proxy signature scheme. Nonrepudiation means the signature signers, both original and proxy signers, cannot falsely deny later that he generated a… (More)
secure association One of the sought-after characteristics of mobile and ubiquitous computing environments is for devices to become spontaneously associated and interoperate over wireless networks. However, unlike the cable that connects two devices in a wired association, a wireless network does not provide a physical indication of which device is on the… (More)
The present fMRI study explores the connectivity among motor areas in a bimanual coordination task using the analysis framework of structural equation modeling (SEM). During bimanual finger tapping at different frequency ratios, temporal correlations of activations between left/right primary motor cortices (MI), left/right PMdc (caudal dorsal premotor area)… (More)
This paper presents practical protocols for authenticating the parameters that characterise a principal's context. Context features in what are known as mobile, ubiquitous, pervasive and nomadic computing systems. Location, in particular, is a highly significant contextual parameter. We present a model of context authentication based on the characteristics… (More)
In this work, we aim to reduce the computational costs of using public-key digital signatures in securing routing protocols. Two protocols (COSP and IOSP) using one-time digital signatures are introduced to provide the functionality of public-key digital signatures. Our protocols are intended to be used in place of public-key digital signatures for signing… (More)
th wireless re-key and au AP (Listens on 'A','K') DHCPREQUEST AP entication information DHCPOFFER AP entication information 1 This article was written before the IEEE 802.11 Task Group on Security (TGi) began significant changes to WEP, and before products supporting IEEE 802.1X and EAP/TLS were available.
BACKGROUND On May 12, 2008, a destructive earthquake registering 8.0 on the Richter scale struck Sichuan Province, southwest China. Beichuan County was the epicenter which was one of the areas nearly completely destroyed by the earthquake. In Beichuan, about 15000 people died and 3000 people were missing. Specially, the earthquake took 1587 students' and… (More)
The mismatch negativity (MMN) is observed following rare or unique sensory events, and reflects pre-attentional sensory processing of unexpected stimuli. The MMN is altered in several mental illnesses, including post-traumatic stress disorder (PTSD), but did not yield consistent results. We measured MMN in 27 survivors of the Wenchuan earthquake, including… (More)