With the increase of multimedia contents in the WWW, multimodal presentation using interactive life-like agents is attractive and becoming important. However, it is not easy for m...
This paper presents an improved version of a multiagent architecture aimed at providing solutions for monitoring the interaction between the atmosphere and the ocean. The ocean sur...
—Validating function pointers dynamically is very useful for intrusion detection since many runtime attacks exploit function pointer vulnerabilities. Most current solutions tackl...
Abstract. We explore three applications of geometric sequences in constructing cryptographic Boolean functions. First, we construct 1-resilient functions of n Boolean variables wit...
In this article, we analyze the security of the GOST hash function. The GOST hash function, defined in the Russian standard GOST 34.11-94, is an iterated hash function producing a ...
Florian Mendel, Norbert Pramstaller, Christian Rec...