– While a lot of existing research attempts to extend the lifetime of a wireless sensor network (WSN) by designing energy efficient networking protocols, the impact of random dev...
Kenan Xu, Hossam S. Hassanein, Glen Takahara, Quan...
Abstract. Core Competence evaluation is crucial for strategical choices in knowledge intensive companies. Such a process is usually manually performed by the management on the basi...
Simona Colucci, Eugenio Di Sciascio, Francesco M. ...
This paper describes our recent analysis on the security and privacy of biometric feature vectors obtained from fingerprint minutiae. A large number of contiguous regions (cuboid...
Telephony over IP is exposed to multiple security threats. Conventional protection mechanisms do not fit into the highly dynamic, open and large-scale settings of VoIP infrastructu...
A consistency protocol can be termed symmetric if all processors are treated identically when they access common resources. By contrast, asymmetric protocols usually assign a home...