Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composi...
The Common Reference String (CRS) model equips all protocol participants with a common string that is sampled from a pre-specified distribution, say the uniform distribution. Thi...
Business processes can be described with diagrams, e.g. BPMN diagrams, or as text. Use cases are a text-based notation. They are semiformal: a business process is expressed as a s...
Jerzy R. Nawrocki, Tomasz Nedza, Miroslaw Ochodek,...
—This paper describes two directed intervention crossover approaches that are applied to a bio-control dynamic system. Unlike traditional uniform crossover, both the Calculated E...