In the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts correspondi...
Background: A growing demand for tools to assist the building and analysis of biological networks exists in systems biology. We argue that the use of a formal approach is relevant...
: Embedded Computer-based Systems are becoming highly complex and hard to implement because of the large number of concerns the designers have to address. These systems are tightly...
The paper addresses some misconceptions of Software Engineering, requirements analysis and modelling in particular, due to underlying epistemological flaws., e.g. the believe that...
There have been various proposals for the formalization of appropriate viewpoint-based frameworks. Each of these approaches have been devised with a specific motive and to addres...