Ping-pong protocols with recursive definitions of agents, but without any active intruder, are a Turing powerful model. We show that under the environment sensitive semantics (i.e....
Research can rarely be performed on large-scale, distributed systems at the level of thousands of workstations. In this paper, we describe the motivating constraints, design princ...
In the late 90's, the emergence of high-performance 3D commodity graphics cards paved the way to the use of PC clusters for high-performance Virtual Reality (VR) applications....
—We present a metaheuristic-based attack against the traceability of an ultra-lightweight authentication protocol for RFID environments called SLMAP, and analyse its implications...
Julio C. Hernandez-Castro, Juan E. Tapiador, Pedro...
A negotiating agent engages in multi-issue bilateral negotiation in a dynamic information-rich environment. The agent strives to make informed decisions. The agent may assume that...