OMAC, TMAC and XCBC are CBC-type MAC schemes which are provably secure for arbitrary message length. In this paper, we present a more tight upper bound on Advmac for each scheme, w...
—Bug-free first silicon is not guaranteed by the existing pre-silicon verification techniques. To have impeccable products, it is now required to identify any bug as soon as the ...
This paper investigates the impact of the polarization on the achievable throughput and the probability of successful transmission in the cellular network architectures. A channel...
Nowadays multi-user VR systems are mostly aimed to social interaction, whereas exploitation of shared virtual environment for educational purposes has been mainly left aside. We i...
We give timed automaton models for a class of Programmable Logic Controller (PLC) applications, that are programmed in a simple fragment of the language Instruction Lists as defin...