The emerging Multimedia Social Network (MSN) provides much more conveniences for the transmission and sharing of multimedia digital contents. However, the scenario on the distribu...
In cloud computing environment, resources are accessed by multiple members. Resources may be considered as VM, CPU, Storage etc. Group key management required when multiple member...
15 Recordings of the Earth’s surface oscillation as a function of time (seismograms) can be sonified by compressing time so that most of the signal’s frequency spectrum falls ...
This paper presents a feasibility study to protect smart card software against fault-injection attacks by means of link-time code rewriting. This approach avoids the drawbacks of s...
Ronald De Keulenaer, Jonas Maebe, Koen De Bosscher...
The best way of selecting samples in algebraic attacks against block ciphers is not well explored and understood. We introduce a simple strategy for selecting the plaintexts and de...
Petr Susil, Pouyan Sepehrdad, Serge Vaudenay, Nico...
Identity-based non-interactive key exchange (IB-NIKE) is a powerful but a bit overlooked primitive in identity-based cryptography. While identity-based encryption and signature ha...
Fuzzy techniques have been originally designed to describe imprecise (“fuzzy”) expert knowledge. Somewhat surprisingly, fuzzy techniques have also been successfully used in si...
Vladik Kreinovich, Hung T. Nguyen, Songsak Sriboon...