Since XML tends to become the main format to exchange data over the Internet, it is necessary to define a security model to control the access to the content of these documents. S...
Instant Messaging is a popular medium for both social and workrelated communication. In this paper we report an investigation of the effect of interpersonal relationship on underl...
: Fault-based side channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy based concu...
—We have defined a software component model which specifies components and composition operators. These operators coordinate and encapsulate concurrency between components. In ...
ORN Additive is a prototype tool that was developed to show how the gap between database modeling and implementation can be reduced—more specifically, to show how associations d...