Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that ...
—The growth of the Internet in the last years has been pushed by increasing requirements in terms of capacity, security and reliability. Moreover, improvements in multimedia appl...
Interruptions are a central characteristic of work in critical environments such as hospitals, airlines, and security agencies. Often, interruptions occur as notifications of some...
Suzanne P. Weisband, Kelly J. Fadel, Elisa Mattare...
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
—Pervasive communications are increasingly sent over mobile devices and personal digital assistants. This trend has been observed during the last football world cup where cellula...
Guillaume Jourjon, Emmanuel Lochin, Patrick S&eacu...