We develop a new methodology for utilizing the prior techniques to prove selective security for functional encryption systems as a direct ingredient in devising proofs of full sec...
This paper introduced GP-Soft, a powerful new patient management system, which is designed to improve the records management for clinic, nursing home and hospital. GP-Soft is a co...
Biometrics systems are automated systems that recognize a person based on physical or behavioral characteristics. There are a number of primary biometric disciplines including fin...
Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems, such as Security Enhanced Linux (SELinux) and AppA...
—We previously proposed a meeting scheduling system based on mobile agent technology. The users of our system do not need to input all of their schedules unlike the existing grou...