Learn More
The explosive growth in wireless networks over the last few years resembles the rapid growth of the Internet within the last decade. During the beginning of the commercialization of the Internet, organizations and individuals connected without concern for the security of their system or network. Over time, it became apparent that some form of security was(More)
Delegation of rights is a common practice in the real world. Proxy signature schemes have been invented to delegate signing capability eeciently and transparently. In this paper, we present a new nonrepudiable proxy signature scheme. Nonrepudiation means the signature signers, both original and proxy signers, cannot falsely deny later that he generated a(More)
The present fMRI study explores the connectivity among motor areas in a bimanual coordination task using the analysis framework of structural equation modeling (SEM). During bimanual finger tapping at different frequency ratios, temporal correlations of activations between left/right primary motor cortices (MI), left/right PMdc (caudal dorsal premotor area)(More)
secure association One of the sought-after characteristics of mobile and ubiquitous computing environments is for devices to become spontaneously associated and interoperate over wireless networks. However, unlike the cable that connects two devices in a wired association, a wireless network does not provide a physical indication of which device is on the(More)
This paper presents practical protocols for authenticating the parameters that characterise a principal's context. Context features in what are known as mobile, ubiquitous, pervasive and nomadic computing systems. Location, in particular, is a highly significant contextual parameter. We present a model of context authentication based on the characteristics(More)
In this work, we aim to reduce the computational costs of using public-key digital signatures in securing routing protocols. Two protocols (COSP and IOSP) using one-time digital signatures are introduced to provide the functionality of public-key digital signatures. Our protocols are intended to be used in place of public-key digital signatures for signing(More)
—CPS is a kind of networked embedded system. Its trustworthiness and cost are impacted by energy consumption. So design a low-power, high trustworthiness CPS has been a major challenge. Modeling and analyzing the energy consumption of CPS software architecture at design stage can help to find the energy consumption design defects. These methods can(More)