We construct an efficient identity based encryption system based on the standard learning with errors (LWE) problem. Our security proof holds in the standard model. The key step in...
Several problems are involved in the Virtual Enterprise (VE) formation process. One of the most important problems is the lack of understanding that may arise during agents’ int...
In this work, we study the extraction of semantic objects using morphological tools. We decompose the image into its level sets and level lines (the borders of the level sets). Sp...
We consider the collection of all spanning trees of a graph with distance between them based on the size of the symmetric difference of their edge sets. A central spanning tree o...
With the Internet rapidly becoming a ubiquitous and global tool inveigling all spheres of our lives so with the joys and pleasure comes the pain. There are many reasons why govern...