Alphanumeric passwords are widely used in computer and network authentication to protect users' privacy. However, it is well known that long, textbased passwords are hard for...
Abstract. We propose a convergent implicit stabilized finite element discretization of the nonstationary incompressible magnetohydrodynamics equations with variable density, viscos...
Application developers utilizing event-based middleware have sought to leverage domain-specific modeling for the advantages of intuitive specification, code synthesis, and suppo...
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
The most studied property, secrecy, is not always sufficient to prove the security of a protocol. Other properties such as anonymity, privacy or opacity could be useful. Here, we u...