Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changi...
Camera phones have been viewed simplistically as digital cameras with poor picture quality while neglecting the utility of the two key functionalities of mobile phones: network co...
: Strategic Simulation Games have become an important element of policy development in the context of Critical Infrastructure Protection (CIP). They foster the network between all ...
This work presents a research on the methods and mechanisms necessary to bring the Information and Communication Technologies in the traditional classroom. This will be achieved by...
Maximiliano Paredes, Manuel Ortega, Pedro P. S&aac...
Cloud computing is a disruptive trend that is changing the way we use computers. The key underlying technology in cloud infrastructures is virtualization – so much so that many ...
Eric Keller, Jakub Szefer, Jennifer Rexford, Ruby ...