This paper introduces the concept of a User Programmable Virtualized Network, which allows networks to deliver application specific services using network element components that ...
Robert J. Meijer, Rudolf J. Strijkers, Leon Gomman...
As computing becomes more ubiquitous and Internet use continues to rise, it is increasingly important for organizations to construct accurate and effective privacy policies that d...
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
This paper reports on a practical implementation of a context mediator for the fixed income securities industry. We describe industry circumstances and the data and calculation se...
We introduce KFC, a block cipher based on a three round Feistel scheme. Each of the three round functions has an SPN-like structure for which we can either compute or bound the adv...