Group communication implies a many-to-many communication and it goes beyond both one-to-one communication (i.e., unicast) and one-to-many communication (i.e., multicast). Unlike most user authentication protocols that authenticate a single user each time, the authors propose a new type of authentication, called group authentication that authenticates all users in a group ...Download Now
The number of rounds and S-Boxes in any symmetric cryptosystem plays a great role on its security as well as on the probability of correct reception at the receiver after decryption. This paper considers a class of symmetric encryption algorithms based on the Data Encryption Standard (DES) and sheds lights ...Download Now
Analysis of REIT credit line availability and use under normal conditions and during the recent financial crisis are provided. Descriptive statistics indicate REIT credit lines represent an important component of capital structure, credit line availability and utilization have increased substantially over the sample period, and REITs maintain precautionary liquidity via ...Download Now
Secure deletion for flash file systems is essential for enhancing the security of embedded systems. Due to the characteristics of flash memory, existing secure deletion schemes cannot be directly adapted to flash file systems. In this paper, the authors propose an efficient secure deletion scheme for flash file systems. It ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?