Learn More
The explosive growth in wireless networks over the last few years resembles the rapid growth of the Internet within the last decade. During the beginning of the commercialization of the Internet, organizations and individuals connected without concern for the security of their system or network. Over time, it became apparent that some form of security was(More)
Delegation of rights is a common practice in the real world. Proxy signature schemes have been invented to delegate signing capability eeciently and transparently. In this paper, we present a new nonrepudiable proxy signature scheme. Nonrepudiation means the signature signers, both original and proxy signers, cannot falsely deny later that he generated a(More)
The present fMRI study explores the connectivity among motor areas in a bimanual coordination task using the analysis framework of structural equation modeling (SEM). During bimanual finger tapping at different frequency ratios, temporal correlations of activations between left/right primary motor cortices (MI), left/right PMdc (caudal dorsal premotor area)(More)
In this work, we aim to reduce the computational costs of using public-key digital signatures in securing routing protocols. Two protocols (COSP and IOSP) using one-time digital signatures are introduced to provide the functionality of public-key digital signatures. Our protocols are intended to be used in place of public-key digital signatures for signing(More)
secure association One of the sought-after characteristics of mobile and ubiquitous computing environments is for devices to become spontaneously associated and interoperate over wireless networks. However, unlike the cable that connects two devices in a wired association, a wireless network does not provide a physical indication of which device is on the(More)
context-aware computing, location-based computing, security, authentication This paper presents a paradigm shift from conventional authentication—of a principal's identity—to authentication of parameters that characterise a principal's context. Location, in particular, i s a highly significant contextual parameter. It is one that features in what are known(More)
BACKGROUND On May 12, 2008, a destructive earthquake registering 8.0 on the Richter scale struck Sichuan Province, southwest China. Beichuan County was the epicenter which was one of the areas nearly completely destroyed by the earthquake. In Beichuan, about 15000 people died and 3000 people were missing. Specially, the earthquake took 1587 students' and(More)