This paper introduces a method for the semi-automatic generation of grammar test items by applying Natural Language Processing (NLP) techniques. Based on manually-designed pattern...
Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service. Even when using a Public Key Infrastructure as X.509, such s...
Altair Olivo Santin, Joni da Silva Fraga, Carlos M...
Often, increased security comes at the expense of user convenience, performance, or compatibility with other systems. The right level of security depends on specific site and use...
: We describe the development of a system to support cooperative software design. An iterative development approach has been used, based upon the observation of system use in authe...
The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols base...
Jose Carrijo, Rafael Tonicelli, Anderson C. A. Nas...