: There is a need for more rigorous analysis techniques that developers can use for verifying the critical properties in UML models. The UML-based Specification Environment (USE) t...
Wuliang Sun, Eunjee Song, Paul C. Grabow, Devon M....
—In this paper, we present an approach for symbol representation and recognition in line drawings, integrating both the vector-based structural description and pixel-level statis...
Message integrity from one sender to one receiver is typically achieved by having the two parties share a secret key to compute a Message Authentication Code (MAC). We consider the...
Automatic fingerprint authentication is an integral part in many security systems. Because not every person is always suited to that technology, a general purpose security system ...
An efficient signcryption scheme based on elliptic curve is proposed in this paper. The signcryption scheme combines digital signature and encryption functions. The proposed schem...