Abstract. We describe a method for combining formal program development with a disciplined and documented way of introducing realistic compromises, for example necessitated by reso...
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys using cryptographic camouflage. Specifically, we do ...
In this paper, we propose a new asymmetric cryptographic algorithm (HOOD CRYPT) based on the Elliptical Curve Cryptographic approach. The algorithm describes how an orthogonal fre...
Robert Steven Owor, Khalil Dajani, Zephyrinus Okon...
Despite recent developments in formal methods, formal methods have yet to enter the mainstream of software industry. In this paper, we first examine the pragmatic obstacles of ma...
Social networks are very popular nowadays and the understanding of their inner structure seems to be promising area. Several approaches for the social network structure visualizat...