The cost of a Software Product Line (SPL) development project sometimes exceeds the initially planned cost, because of requirements volatility and poor quality. In this paper, we p...
Makoto Nonaka, Liming Zhu, Muhammad Ali Babar, Mar...
- The requirement for a commonly accepted efficient mapping between multimedia metadata standards and semantic web-ontology standards is a major issue recognized by semantic multim...
Babak Akhgar, Jawed I. A. Siddiqi, Fazilatur Rahma...
Abstract. Cryptographic protocols are often designed and analyzed under some trusted set-up assumptions, namely in settings where the participants have access to global information...
Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi W...
Attackers take advantage of any security breach to penetrate an organisation perimeter and exploit hosts as stepping stones to reach valuable assets, deeper in the network. The exp...
Virginia N. L. Franqueira, Raul H. C. Lopes, Pasca...
The security of electronic payment protocols is of interest to researchers in academia and industry. While the ultimate objective is the safest and most secure protocol, convenien...