In this paper we propose three smartcard-based variants of anonymous authentication using unique one-time pseudonyms. The first variant can be used to authenticate a user. However,...
: XML is unique in its very broad acceptance throughout both the document engineering and data processing community. This creates a unique opportunity for unifying the traditionall...
Andrea R. de Andrade, Ethan V. Munson, Maria da Gr...
— We consider a multiuser network that is shared by noncooperative users. Each user sets up virtual paths that optimize its own selfish performance measure. This measure account...
Aurel A. Lazar, Ariel Orda, Dimitrios E. Pendaraki...
We introduce the notion of sofic tree-shifts which corresponds to symbolic dynamical systems of infinite trees accepted by finite tree automata. We show that, contrary to shifts of...
System administrators are unique computer users. As power users in complex and high-risk work environments, intuition tells us that they may have requirements of the tools they us...
Nicole F. Velasquez, Suzanne P. Weisband, Alexandr...