We propose a practical public-key encryption scheme whose security against chosen-ciphertext attacks can be reduced in the standard model to the assumption that factoring is intrac...
Business process models play an important role for the management, design, and improvement of process organizations and process-aware information systems. Despite the extensive ap...
Jan Mendling, Gustaf Neumann, Wil M. P. van der Aa...
— Many software development methodologies are based on modeling the real world. In some of these methodologies, real-world models are gradually transformed into software models, ...
Due to the low entropy of human-memorable passwords, it is not easy to conduct password authenticated key agreement in a secure manner. Though there are many protocols achieving th...
The GOLD Community of Practice is proposed as a model for linking on-line linguistic data to an ontology. The key components of the model include the linguistic data resources them...