Learn More
The explosive growth in wireless networks over the last few years resembles the rapid growth of the Internet within the last decade. During the beginning of the commercialization of the Internet, organizations and individuals connected without concern for the security of their system or network. Over time, it became apparent that some form of security was(More)
Delegation of rights is a common practice in the real world. Proxy signature schemes have been invented to delegate signing capability eeciently and transparently. In this paper, we present a new nonrepudiable proxy signature scheme. Nonrepudiation means the signature signers, both original and proxy signers, cannot falsely deny later that he generated a(More)
The present fMRI study explores the connectivity among motor areas in a bimanual coordination task using the analysis framework of structural equation modeling (SEM). During bimanual finger tapping at different frequency ratios, temporal correlations of activations between left/right primary motor cortices (MI), left/right PMdc (caudal dorsal premotor area)(More)
secure association One of the sought-after characteristics of mobile and ubiquitous computing environments is for devices to become spontaneously associated and interoperate over wireless networks. However, unlike the cable that connects two devices in a wired association, a wireless network does not provide a physical indication of which device is on the(More)
context-aware computing, location-based computing, security, authentication This paper presents a paradigm shift from conventional authentication—of a principal's identity—to authentication of parameters that characterise a principal's context. Location, in particular, i s a highly significant contextual parameter. It is one that features in what are known(More)
In this work, we aim to reduce the computational costs of using public-key digital signatures in securing routing protocols. Two protocols (COSP and IOSP) using one-time digital signatures are introduced to provide the functionality of public-key digital signatures. Our protocols are intended to be used in place of public-key digital signatures for signing(More)
The visual search paradigm has been widely used to study the mechanisms underlying visual attention, and search asymmetry provides a source of insight into preattentive visual features. In the current study, we tested visual search with biological-motion stimuli that were spatially scrambled or that represented feet only and found that observers were more(More)