Cryptanalysis of symmetric and asymmetric ciphers is a challenging task due to the enormous amount of involved computations. To tackle this computational complexity, usually the e...
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a message simultaneously, during which the recipient can prove the dishonesty of t...
A system that allows people to simultaneously modify a common design in a graphically rich environment was developed to identify and examine groupware interface issues unique to t...
This paper proposes a support tool for designers who have realized the potential benefits of using a scenario-based approach, yet need a more concrete guidance for its implementati...
This is a theoretical and experimental study of microstrip reflectarray useable in wireless local area networks (WLAN). The effectiveness of reducing the unit cell size of microstr...