1 Electronic fair-exchange protocols have received significant attention from the research community in the recent past. In loose terms, the fair exchange problem is defined as at...
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
There is an increasing need within the Navy and Marine Corps for building distributed situation-aware applications that are rapidly recon gurable and survivable in the face of att...
d abstract) Bartosz Przydatek1 and Reto Strobl2 1 Department of Computer Science, ETH Z¨urich, Switzerland 2 IBM Research, Zurich Research Laboratory, Switzerland In this paper, w...
Medical image reconstruction remains a topic of interest to medical researchers. Although the algorithms have become more mature, one particular challenge has persisted over the de...