In method-based software development, software engineers create artifacts based on the heuristic rules of the adopted method. Most CASE tools, however, do not actively assist soft...
We present a provably secure tree based authenticated group key agreement protocol in dynamic scenario. Bilinear pairing and multi-signature are at the heart of our protocol. We p...
Access links are typically the bottleneck between a high bandwidth LAN and a high bandwidth IP network. Without a priori resource provisioning or reservation, this tends to have a...
- Application level active networks provide a way of transforming the current network infrastructure into one where new services and protocols are more easily adopted and utilized ...
Nikolaos D. Dragios, Constantine Harbilas, Konstan...
Collaboration between peers is an important aspect of the learning process and can considerably augment learning in studying complex domains. To ensure that peer collaboration occ...