New systems can be created by assembling a set of elementary services provided by various stakeholders in a service composition. Service composition is not a trivial endeavor and ...
— Sharing IP blocks in today’s competitive market poses significant high security risks. Creators and owners of IP designs want assurances that their content will not be illeg...
Cryptographic computations are often carried out on insecure devices for which the threat of key exposure represents a serious concern. Forward security allows one to mitigate the...
We present a set of watermarking techniques for effective covert communication over an audio signal carrier. Watermark robustness is enabled using: (i) redundant spread-spectrum fo...
: Today, electronic cross-company collaboration is about to gain significant momentum, but still shows weaknesses with respect to productivity, flexibility and quality: A lack of s...