Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
nded abstract of this work appears Advances in Cryptology — Asiacrypt 2000, Tatsuaki Okamoto, editor, Lecture Notes in Computer Science vol. 1976, Springer-Verlag, 2000. c IACR A...
This paper describes a new approach to visualization of scenarios within the use case-based engineering of functional requirements – the so-called Video Camera metaphor. The Vid...
The process of authoring document-centric XML documents in humanities disciplines is very different from the approach espoused by the standard XML editing software with the data-c...
While Eclipse has greatly simplified the task of creating integrated development environments, creating a full-featured IDE can still take years. Fortunately, for a large categor...