In this paper, we present a password stretching method using user specific salts. Our scheme takes similar time to stretch a password as recent password stretching algorithms, but...
In this paper we show how to use labelled event structures as a unique mathematical representation for design models consisting of different UML 2.0 diagrams/notation. Each diagra...
One of the most challenging problems in managing large networks is the complexity of security administration. Role based access control (RBAC) has become the predominant model for...
Tuan-Anh Nguyen, Linying Su, George Inman, David W...
Location awareness and mobility are main factors in pervasive computing. There is a lot of work focusing on develop location aware applications. Generalizing from location awarene...
—As the application and complexity of microelectromechanical (MEMS) devices increases, there is a corresponding need for automated design and optimization tools to augment engine...
Jason D. Lohn, William F. Kraus, Gregory S. Hornby