Hardware implementations of cryptographic algorithms are still vulnerable to side-channel attacks. Side-channel attacks that are based on multiple measurements of the same operatio...
The concept of self-presence provides a framework for understanding how people connect to virtual self-representations on three distinct levels (body, emotions, and identity). The...
Companies that are present at multiple online locations may have difficulty staffing them adequately in terms of helpdesk services with efficient use of human resources. In this pa...
Leonel Morgado, Paulo Reis, Fausto de Carvalho, Ti...
Abstract Extremist organizations are heavily utilizing Internet technologies to increase their abilities to influence the world. Studying those global extremist organizations’ In...
In order to increase a user’s sense of presence in an artificial environment some researchers propose a gradual transition from reality to the virtual world instead of immersin...
Frank Steinicke, Gerd Bruder, Klaus Hinrichs, Anth...