We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active att...
: This paper describes using agents in the exchange of industrial product data when predefined translators are not available. A major problem with standard translators is that a se...
When web servers publish data formatted in XML, only the current state of the data is (generally) published. But data evolves over time as it is updated. Capturing that evolution i...
Curtis E. Dyreson, Richard T. Snodgrass, Faiz Curr...
Recently, Yeh et al. proposed an improved password authenticated key exchange scheme (YSYCT scheme) which is secure against undetectable on-line password guessing attacks and prov...
Image sequence processing techniques are essential to study dynamical processes such as exchange, growth, and transport processes. In this survey paper, a generalized framework for...