Abstract This paper surveys the literature on certificateless encryption schemes. In particular, we examine the large number of security models that have been proposed to prove the...
With the wide deployment of digital technologies, come along information artefacts in various forms for various purposes that consumers have to interact with. This paper reports a...
This paper provides a survey of the itemset method for association rule generation. The paper discusses past research on the topic and also studies the relevance and importance of...
Abstract. Software systems are today one of the most complex artifacts, they are simultaneously used by hundred-thousand of people sometimes in risk real time operations, such as a...
Program transformation systems provide one means of formally deriving a program from its speci cation. The main advantage of this development method is that the executable program...