A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secre...
Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae L...
It is common for libraries to provide public access to historical and ancient document image collections. It is common for such document images to require specialized processing i...
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
This paper describes DTC (Documents, Transformations and Components), our approach to the XML-based development of content-intensive applications. According to this approach, the ...
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...