This paper discusses issues pertaining to mechanisms which can be used to change the behaviour of Java classes at runtime. The proxy mechanism will be compared to and contrasted with other standard approaches to this ...
This paper presents a novel approach to a familiar problem - that of helping users to choose better passwords, and to remember them. User identification and authentication is an essential aspect of our technologically ...