— Databases associated with keywords, can be public, private or hybrid, as a result the solutions to keyword search protocols for each type are different. In this paper, we study...
— We present and evaluate the design of a new and comprehensive solution for automated worm detection and immunization. The system engages a peer-to-peer network of untrusted mac...
— Updating software in vehicle Electronic Control Units (ECUs) will become a mandatory requirement for a variety of reasons, for examples, to update functionality of an existing ...
We present a practical attack on the Panama hash function that generates a collision in 26 evaluations of the state updating function. Our attack improves that of Rijmen and cowork...
High throughput virtual screening is acknowledged as the initial means for identifying hit compounds that will be eventually transformed to leads or drug candidates. To improve qu...
Suzanne W. Sirois, George Hatzakis, Dongqing Wei, ...