We investigate polynomials satisfying a three-term recurrence relation of the form Bn(x) = (x - n)Bn-1(x) - nxBn-2(x), with positive recurrence coefficients n+1, n (n = 1, 2, . . ...
Certificate policies play a central role in public key infrastructures, since they are the basis for the evaluation of trust in binding between a key and a subject in a public key...
A decomposition scheme for 3D fuzzy objects is presented. The decomposition is guided by a fuzzy distance transform (FDT) of the fuzzy object and aims to decompose the fuzzy objec...
In PODC 2003, Park, Chong, Siegel and Ray [22] proposed an optimistic protocol for fair exchange, based on RSA signatures. We show that their protocol is totally breakable already...
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...