Abstract. In many cryptographic applications it is necessary to generate elliptic curves (ECs) with certain security properties. These curves are commonly constructed using the Com...
Elisavet Konstantinou, Yannis C. Stamatiou, Christ...
Digital libraries have been rather successful in supporting learning activities by providing learners with access to information and knowledge. However, this level of support is pa...
Ee-Peng Lim, Aixin Sun, Zehua Liu, John G. Hedberg...
For more scalable mobile services, it is important to reduce the signaling cost for location management. In this paper, we propose a cost effective IP paging scheme utilizing expl...
— In a push-based system, updates that are made to objects are sent to clients, without them explicitly requesting these updates. The focus of this research is to develop a serve...
Quality of Service (QoS) routing methods are expected to replace existing routing protocols in future QoS-based data networks. QoS routing allows the selection of feasible paths f...