![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter
An Authentication and Security Protocol for Mobile Computing
The main contributions of this paper are: (1) to analyze an authentication and key distribution protocol for mobile computing proposed by Beller, Chang and Yacobi in 1993, and reveal two problems associated wi...
-
Chapter
USD: Scalable Bandwidth Allocation for the Internet
In this paper, we present a differentiated service scheme called “User-Share Differentiation (USD)”. The USD scheme is designed for long-term bandwidth allocation without per-session signaling. The scheme allo...
-
Chapter
A Cut-Off Priority Flow Classification Policy for Data-Driven IP/ATM Switching Systems
Flow classification is one of the key issues in the design of a data-driven IP/ATM switching system. To classify flows by applications is an effective approach in a real system due to its simplicity in impleme...
-
Chapter
Fair Bandwidth Allocation for Differentiated Services
In this paper, we present a comparative study of three proposals for differentiated services — the RIO scheme, the two-bit scheme and the User-Share Differentiation (USD) scheme. We simulate the three schemes ...
-
Chapter and Conference Paper
Unconditionally Secure Digital Signature Schemes Admitting Transferability
A potentially serious problem with current digital signature schemes is that their underlying hard problems from number theory may be solved by an innovative technique or a new generation of computing devices ...
-
Chapter and Conference Paper
On Relationships among Avalanche, Nonlinearity, and Correlation Immunity
We establish, for the first time, an explicit and simple lower bound on the nonlinearity N f of a Boolean function f of n variables satisfying the avalanche criterion of degree p, namely, Nf≥ 2n-1
-
Chapter and Conference Paper
Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite
Signcryption is a public key cryptographic primitive that fulfills the functions of digital signature and public key encryption concurrently, with a cost smaller than that required by the traditional signature...
-
Chapter and Conference Paper
Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions
It has recently been shown that when m > 1/2n - 1, the nonlinearity N f of an mth-order correlation immune function f with n variables satisfies the condition of N
-
Chapter and Conference Paper
Architecture of Generalized Network Service Anomaly and Fault Thresholds
In this paper we introduce GAFT (Generalized Anomaly and Fault Threshold), featuring a novel system architecture that is capable of setting, monitoring and detecting generalized thresholds and soft faults proa...
-
Chapter and Conference Paper
Security Notions for Unconditionally Secure Signature Schemes
This paper focuses on notions for the security of digital signature schemes whose resistance against forgery is not dependent on unproven computational assumptions. We establish successfully a sound and strong...
-
Chapter and Conference Paper
Interactive Deformation of Irregular Surface Models
Interactive deformation of surface models, which consist of quadrilateral (regular) and non-quadrilateral (irregular) surface patches, arises in many applications of computer animation and computer aided produ...
-
Chapter and Conference Paper
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code
Digital signatures whose security does not rely on any unproven computational assumption have recently received considerable attention. While these unconditionally secure digital signatures provide a foundatio...
-
Chapter and Conference Paper
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme
Ring signature allows to specify a set of possible signers without revealing which member actually produced the signature. This concept was first formalized in 2001 by Rivest, Shamir, and Tauman[3]. Authors of...
-
Chapter and Conference Paper
Design and Implementation of a True Random Number Generator Based on Digital Circuit Artifacts
There are many applications for true, unpredictable random numbers. For example the strength of numerous cryptographic operations is often dependent on a source of truly random numbers. Sources of random infor...
-
Chapter and Conference Paper
An Implementation of Storage-Based Synchronous Remote Mirroring for SANs
Remote mirroring ensures that all data written to a primary storage device are also written to a remote secondary storage device to support disaster recoverability. In this study, we designed and implemented a...
-
Chapter and Conference Paper
Network-Embedded Programmable Storage and Its Applications
We consider the utility of two key properties of network-embedded storage: programmability and network-awareness. We describe two extensive applications, whose performance and functionalities are significantly...
-
Chapter and Conference Paper
MagicStore: A New Out-of-Band Virtualization System in SAN Environments
In this paper, MagicStore, a new out-of-band virtualization system designed for SAN environments is proposed. Online multiplication of the components in a striped volume can help enhance both the I/O performan...
-
Chapter and Conference Paper
A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services
Today’s grid architecture encompasses a far greater breadth of applications than the traditional grid, which focused on distributed applications processing large amounts of data. Newer grid applications are mo...
-
Chapter and Conference Paper
Pattern-Based Specification and Validation of Web Services Interaction Properties
There have been significant efforts in providing semantic descriptions for Web services, including the approach as exemplified by OWL-S. Part of the semantic description in OWL-S is about the interaction proce...
-
Chapter and Conference Paper
Modelling and Analysis of Power Consumption for Component-Based Embedded Software
With the increasing complexity of the real-time embedded software, the power consumption is becoming a real challenge in the system designs. In this paper, for modelling the component-based embedded software, ...