Donato et al. (Brevia, 20 January 2006, p. 352) concluded that logging after wildfire kills natural
regeneration and increases fire risk. We argue that their paper lacks adequate context and
supporting information to be clearly interpreted by scientists, resource managers, policy-makers,
and the public.
Authentication protocols play important roles in network security. A variety of authentication protocols ranging from complex public-key cryptosystems to simple password-based authentication schemes have been proposed. However, currently there is no fully secure authentication scheme that can resist all known attacks. When a user authentication is performed over an insecure...