The security of pairing-based cryptosystems is closely related to the difficulty of the pairing inversion problem. Building on previous works, the authors provide further contributions on the difficulty of pairing inversion. In particular, they revisit the approach of Kanayama-Okamoto who modified exponentiation inversion and Miller inversion by considering an "Auxiliary" ...Download Now
Since open platforms such as Android vary in device manufacturers and application developers, modifications in software happened in multiple layers. Therefore, every layer including OS, library, framework and application may have defects within. Especially, a memory leakage which increases memory usage and diminish overall system performance is the key issue ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?