Abstract. To cope with the ever increasing diversity of markup languages, programming languages, tool kits and interface development environments, conceptual modeling of user inter...
Embedded devices implementing cryptographic services are the result of a trade-off between cost, performance and security. Aside from flaws in the protocols and the algorithms us...
When considering information security and privacy issues most of the attention has previously focussed on data protection and the privacy of personally identifiable information (PI...
Abstract. This paper argues that the driving task exhibits the properties of complex systems. Driving behavior emerges from the intricate and complex interactions between the drive...
In recent years different institutions have launched several telemedicine projects which aimed to encourage the Euro-Mediterranean cooperation. The creation of a Virtual Euro-Medit...
Georgi Graschew, Theo A. Roelofs, Stefan Rakowsky,...