Abstract. We formally analyze the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous weaknesses, both old and new, including some th...
Software tools are used to compare multiple versions of a textual document to help a reader understand the evolution of that document over time. These tools generally support the ...
Relation models have treated multi-holed regions relations either the same as hole-free regions relations, loosing this way the peculiarities of the holed topology, or with methods...
Google Maps and Google Earth are very popular web mapping services but they are not open and not OGC-compliant. The question arises why this is not the case. One reason is that com...
Abstract. Current mobile computing systems can automatically sense and communicate detailed data about a person’s location. Location privacy is an urgent research issue because c...