Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
The definition and management of access rules (e.g., to control the access to business documents and business functions) is an important task within any enterprise information sy...
Web sites are often organized into several regions, each dedicated to a specific topic or serving a particular function. From a user’s perspective, these regions typically form ...
Bluetooth is a new wireless standard for low cost, low power, local radio communications. This technology is designed to be small enough to fit inside any electronic device, hence...
OO-Method is an OO Methodology that blends the use of formal specification systems with conventional OO methodologies based on practice. In contrast to other approaches in this fi...