The passwords people can remember are usually simple or meaningful. In three-party key exchange protocols with password authentication, clients are al...
Recently, Li et al. proposed two group-oriented (t, n) threshold digital signature schemes with traceable signers, which allow any t out of n members...
A new technique and an algorithm have been designed which are meant to automatically capture the outlines of fonts. A more .exible class of B ezier !...
The current research attempts to update our knowledge of the way in which defects and the expense of correcting them (or alternatively, leaving them...
Demonstration programs have a long and storied history in the .eld of computer science education. This is particularly true in the area of computer gr...