In a traditional signature scheme, a signature on a message m is issued under a public key PK, and can be interpreted as follows: "The owner of the public key PK and its corr...
Designers of cryptographic systems are at a disadvantage to most other engineers, in that information on how their systems fail is hard to get: their major users have traditionall...
This paper describes a method for controlling the behavior of mobile agent-system entities through the allocation of privileges. Privileges refer to policy rules that govern the a...
: In the adaptive fuzzy control field for affine nonlinear systems, there are two basic configurations: direct and indirect. It is well known that the direct configuration needs mo...
There are numerous rectangular signboards indoors and outdoors. The information contained in them, such as signs and text, is useful for robot navigation. In this paper, a system ...