We describe the design and implementation of secure and robust protocol and system for a national electronic lottery. Electronic lotteries at a national level are a viable cost eļ¬...
Elisavet Konstantinou, Vasiliki Liagkou, Paul G. S...
: Humans have complex sensory and control capabilities. Only a few are used in standard games and virtual environments. Examples of games using interfaces beyond mouse, keyboard an...
There has been increased interest in reliable, non-intrusive methods of biometric identification due to the growing emphasis on security and increasing prevalence of identity thef...
Oleg V. Komogortsev, Sampath Jayarathna, Cecilia R...
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-proļ¬le attacks against...
This paper presents a framework for analyzing the performance of multithreaded programs using a model called a constraint graph. We review previous constraint graph definitions fo...