The Hopper-Blum (HB) protocol, which uses noised linear parities of a shared key for authentication, has been proposed for light-weight applications such as RFID. Recently, algorit...
Mukundan Madhavan, Andrew Thangaraj, Yogesh Sankar...
Interactions within Multi-agent systems can be structured in different ways depending on the application scenario and its environmental restrictions. In previous work we have devel...
In this paper, we describe a digital scenario where we simulated the emergence of self-organized symbol-based communication among artificial creatures inhabiting a virtual world of...
Angelo Loula, Ricardo R. Gudwin, Charbel Niñ...
Recommendation Systems have become an important tool to cope with the information overload problem by acquiring data about the user behavior. After tracing the user behavior, throu...
Byron Leite Dantas Bezerra, Francisco de Assis Ten...
— Most of existing privacy preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are cont...
Jianneng Cao, Barbara Carminati, Elena Ferrari, Ki...