The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
This document describes the core Legion object model. The model specifies the composition and functionality of Legion's core objects--those objects that cooperate to create, ...
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
We propose a new family of barycentric coordinates that have closed-forms for arbitrary 2D polygons. These coordinates are easy to compute and have linear precision even for open ...
Geometric models created from range sensors are usually incomplete. Considerable effort has been made to fix this problem, ranging from manual repairing to geometric interpolatio...