—The two-server model is quite promising for password based authentication, well suited for the setting of federated enterprises. However, none of the existing two-server passwor...
Passive worm have posed serious security threats to the functioning of unstructured P2P networks. A delayed SEIRS epidemic model with death, off line and online rate is constructe...
Background: The biomedical community is developing new methods of data analysis to more efficiently process the massive data sets produced by microarray experiments. Systematic an...
David M. Mutch, Alvin Berger, Robert Mansourian, A...
Queries describe the users' search intent and therefore they play an essential role in the context of ranking for information retrieval and Web search. However, most of exist...
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...