Many access control policy languages, e.g., XACML, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the result...
Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa B...
JPEG2000, the new standard for still image coding, Quantization, user defined wavelets, arbitrary wavelet provides a new framework and an integrated toolbox to better decomposition...
Cryptographic substitution boxes (S-boxes) are an integral part of modern block ciphers like the Advanced Encryption Standard (AES). There exists a rich literature devoted to the ...
Stefan Tillich, Martin Feldhofer, Thomas Popp, Joh...
There is a need for information, application, and other enterprise architectures which are robust and flexible enough to meet the challenges of today’s heterogeneous, rapidly cha...
Integrating contributions received from other agents is an essential activity in multi-agent systems (MASs). Not only must related contributions be integrated together, but the co...