In this paper, we reinvestigate the security analysis of blind signature scheme over braid groups proposed by Verma in 2008. A blind signature scheme is a cryptographic primitive ...
The idea of design domain specific Mother Model of IP block family as a base of modeling of system integration is presented here. A common reconfigurable Mother Model for ten diff...
—This paper reveals weaknesses of existing e-learning system and puts forward a novel architecture of five layers from the perspective of knowledge innovation. Learner interface ...
In this paper, we present our experiences concerning the enforcement of access rights extracted from ODRL-based digital contracts. We introduce the generalized Contract Schema (Co...
A system for the acquisition, storage, indexing, and retrieval of map images is presented. The input to this system are raster images of separate map layers and map composites. A ...