Abstract. A recent branch of cryptography focuses on the physical constraints that a real-life cryptographic device must face, and attempts to exploit these constraints (running ti...
Peer-to-Peer (P2P) systems seek to provide sharing of computational resources, which may be duplicated or versioned over several peers. Duplicate resources (i.e. replicas) are the...
Deise de Brum Saccol, Nina Edelweiss, Renata de Ma...
Virtual Reality (VR) has gained more popularity in the recent years due to the advancements in hardware technology, an advancement that eliminated much of the limitations that VR ...
—We are witnessing a tremendous hype on the Internet of Things paradigm, with not only research projects, but also commercial products claiming to implement its fundamental mecha...
— Many future ubiquitous devices will be able to determine their precise physical position using different types of localization techniques (e.g. GPS antennas for outdoor-, RFID ...