Operations on spatial objects have much individuality. As a consequence, the spatial data modelling approaches, which have been proposed, have to consider either data types of the...
Anonymous channels or similar techniques that can achieve sender's anonymity play important roles in many applications. However, they will be meaningless if cryptographic prim...
Although the Yahalom protocol, proposed by Burrows, Abadi, and Needham in 1990, is one of the most prominent key establishment protocols analyzed by researchers from the computer s...
In this paper we study the sequence (ci)0id for a distance-regular graph. In particular we show that if d 2j and cj = c > 1 then c2j > c holds. Using this we give improveme...
s the development of an abstract description of what there is in the world in an application-independent form. This paper argues that attempts to support information systems intero...