Single-electron devices have drawn much attention in the last two decades. They have been widely used for device research and also show promise as a potential alternative to compl...
Group key exchange protocols allow their participants to compute a secret key which can be used to ensure security and privacy for various multi-party applications. The resulting g...
Current biological theory has no commonly accepted view on the phenomenon of aging. On the one hand it is considered as an inescapable degradation immanent to complex biological sy...
While the need to build the Intrusion Detection Systems (IDS) based on on a distributed and cooperative (P2P) paradigm is being generally acknowledged, the field has been disconne...
Driven by new regulations and animal welfare, the need to develop in silico models has increased recently as alternative approaches to safety assessment of chemicals without animal...