When authors publish their interpretations of the ideas, opinions, claims or rebuttals in the literature, they are drawing on a repertoire of well understood moves, contributing t...
Bertrand Sereno, Simon Buckingham Shum, Enrico Mot...
Abstract. In many cryptographic applications it is necessary to generate elliptic curves (ECs) with certain security properties. These curves are commonly constructed using the Com...
Elisavet Konstantinou, Yannis C. Stamatiou, Christ...
The usability of a user interface is often neglected in the design and development of software applications. An Integrated Development Environment (IDE) is prone to poor usability...
Ying Zou, Michael Lerner, Alex Leung, Scott Moriss...
- Today there is a real challenge in accessing relevant information according to the needs and the context of the user. Recent studies have dynamically enhanced the user query with...
Using smart cards, remote user authentication and key agreement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to use...