We address the problem of optimizing a distributed monitoring system and the goal of the optimization is to reduce the cost of deployment of the monitoring infr
A proxy signature scheme with message recovery using self-certified public key is proposed, which withstands public key substitution attacks, active attacks, an
By utilizing artificial intelligence and pattern recognition techniques, we propose an integrated mobile-customer identity recognition approach in this paper, b