Since communication has become an integral part of modernlife, security and authentication have also become important issues for providing secure communication. The issue of providing communication among a group of users has also been in the forefront, and multicasting has become a key technology for supporting such communication. This thesis explores new methods for multicast authentication. First, the thesis discusses several multicast authentication schemes: (i) public-key systems and Message Authentication Codes (MACs), and their relation to multicast authentication, and (ii) different views of multicast authentication, including digital streams, off-line computation, and using less secure but more efficient authentication algorithms. T...
The Internet of Things is inter-connection of humans, physical devices, buildings, vehicles and man...
The advent of new and improved brain imaging tools in recent decades has provided significant progre...
In Data Intensive Computing, properties of the data that are the input for an application decide run...
The advent of the UMTS mobile network technology and recent advances in wireless LANs create new pos...
Wearable embedded devices are in common use in the medical industry. In today’s society security is ...
In software development, testing often takes more than half the total development time (Pan 1999). T...
Significant progress has been made over the last decades in understanding the physiological and neur...
The IQP team\u27s goal was to determine each department\u27s space needs while simultaneously identi...
One of the most significant developments in the online environment over the last few years has been ...
PKI is often referred to as a pervasive substrate. This terminology is used to describe the technol...
A microprocessor designated AVM-1 was designed to demonstrate the use of generic interpreters in ver...
Within the activities of the Networking Activity 4 (NA4) module called “Distributed Archive of Histo...
Recent increases in cybercrime suggest questions such as: How can one trust a secure system? How can...
Digital artifacts are an important part of today's culture. However many digital artifact owners don...
“Simulation” is a word that might be familiar to everybody. Its meaning is so expanded in all secto...
The Internet of Things is inter-connection of humans, physical devices, buildings, vehicles and man...
The advent of new and improved brain imaging tools in recent decades has provided significant progre...
In Data Intensive Computing, properties of the data that are the input for an application decide run...
The advent of the UMTS mobile network technology and recent advances in wireless LANs create new pos...
Wearable embedded devices are in common use in the medical industry. In today’s society security is ...
In software development, testing often takes more than half the total development time (Pan 1999). T...
Significant progress has been made over the last decades in understanding the physiological and neur...
The IQP team\u27s goal was to determine each department\u27s space needs while simultaneously identi...
One of the most significant developments in the online environment over the last few years has been ...
PKI is often referred to as a pervasive substrate. This terminology is used to describe the technol...
A microprocessor designated AVM-1 was designed to demonstrate the use of generic interpreters in ver...
Within the activities of the Networking Activity 4 (NA4) module called “Distributed Archive of Histo...
Recent increases in cybercrime suggest questions such as: How can one trust a secure system? How can...
Digital artifacts are an important part of today's culture. However many digital artifact owners don...
“Simulation” is a word that might be familiar to everybody. Its meaning is so expanded in all secto...
The Internet of Things is inter-connection of humans, physical devices, buildings, vehicles and man...
The advent of new and improved brain imaging tools in recent decades has provided significant progre...
In Data Intensive Computing, properties of the data that are the input for an application decide run...