We present the adaptation of our model for the validation of key distribution and authentication protocols to address specific needs of protocols for electronic commerce. The two ...
—We present a Horn-clause-based framework for analysing security protocols that use platform configuration registers (PCRs), which are registers for maintaining state inside the...
A framework to design simulation models is described in order to perform activity-based costing for flexible manufacturing systems before actual manufacturing activities. For illu...
—Ultra-wideband (UWB) technique attracts attention from automotive manufacturers as a potential way to construct intra-vehicle wireless sensor network. This paper reports our pre...
The military develops simulations to analyze nearly every aspect of defense. How accurate are these simulations and to what extent do they produce dependable results? Most guidanc...
Scott D. Simpkins, Eugene P. Paulo, Lyn R. Whitake...