—The two-server model is quite promising for password based authentication, well suited for the setting of federated enterprises. However, none of the existing two-server passwor...
—This paper presents VSK, a lightweight adaptable OS authorization architecture suitable for self-protection of pervasive devices. A “virtual” management plane, separate from...
—Students are difficult to get an effective way to master essential knowledge of J2EE course because they are lack programming experiments and teaching content is too much. In th...
With the increasing development of mobile rich media applications, it has become an important research topic on how to reduce application response time so as to run more smoothly ...
—As we all know, Hanoi Problem is a classical case of recursive algorithm in programming. In this paper, we study the problem in another way by numbering the peg from bottom to t...