In this paper, the limitation of the GNY logic about its inability to detect the reflection attacks againstsome authentication protocols is given. An improvemen
The basis of distributed system conformance testing is to test theconformance of each entity with its standard. This paper addresses theapproach to entity confo
The situation of multi-region problemmay often appear when boundary element method (BEM) is applied inpractical problems especially in VLSI-CAD. It is difficult
It is an efficient way for a mobilehost to obtain multicast service via a local multicast router on thevisited network. However, there is a possibility for a te