Several architectures have been recently proposed that store relational data in encrypted form on untrusted relational databases. Such architectures permit the creation of novel I...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
In this paper we present the results of the experimental analysis of the transmission of voice over secure communication links implementing IPsec. Critical parameters characterizi...
Socio-technical developments in computing have resulted in the emergence of innovative mobile systems which exploit the information available on the Internet to optimize the perfo...
Pravin Pawar, Bert-Jan van Beijnum, Hermie Hermens...
Complex systems experience dramatic changes in behavior and can undergo transitions from functional to dysfunctional states. An unstable system is prone to dysfunctional collective...
As on-chip networks become prevalent in multiprocessor systemson-a-chip and multi-core processors, they will be an integral part of the design flow of such systems. With power in...