Many areas of science currently use computing resources as a important part of their research, and many research groups adopt cluster architecture to use them efficiently and mana...
Hyuck Han, Jai Wug Kim, Jongpil Lee, Youngjin Yu, ...
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
We propose a proximity-based access control scheme for implantable medical devices (IMDs). Our scheme is based on ultrasonic distancebounding and enables an implanted medical devi...
Kasper Bonne Rasmussen, Claude Castelluccia, Thoma...
— Micro-payment systems have the potential to provide non-intrusive, high-volume and low-cost pay-asyou-use services for a wide variety of web-based applications. We proposed a n...
Abstract— Wireless sensor networks, by providing an unprecedented way of interacting with the physical environment, have become a hot topic for research over the last few years. ...