We prove beyond-birthday-bound security for most of the well-known types of generalized Feistel networks: (1) unbalanced Feistel networks, where the n-bit to m-bit round functions ...
Although facial features are considered to be essential for humans to understand sign language, no prior research work has yet examined their significance for automatic sign langu...
Ulrich von Agris, Moritz Knorr, Karl-Friedrich Kra...
With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a critical issue. Seve...
Following the ideas of the Remote Procedure Call model, we have developed a logic programming counterpart, naturally called Prolog Remote Predicate Call (Prolog RPC) [1]. The Prol...
Abstract— Software component technologies are being accepted as an adequate solution for handling the complexity of applications. However, existing software component models tend...
Gabriel Antoniu, Hinde-Lilia Bouziane, Mathieu Jan...