In 2004, a new attack against SHA-1 has been proposed by a team leaded by Wang [15]. The aim of this article5 is to sophisticate and improve Wang’s attack by using algebraic tech...
With the advance of pervasive technology, information from both the physical and virtual world is increasingly accessible to developers. Context -aware applications may consume re...
— In this paper we have suggested a sparse three dimensional array model for the brain. Entries of the array are synaptic weights as functions of time. This is a typical four dim...
Simulatable security is a security notion for multi-party protocols that implies strong composability features. The main definitional flavours of simulatable security are standa...
This paper illustrates how the notion of pattern can be used in the automatic analysis and synthesis of diagrams, applied particularly to the automatic marking of ER-diagrams. The...