Bibliography—the collection, description, and arrangement of information items—is a vibrant activity and a popular form of expression on the internet. Yet, fashionable forms o...
1 On the Internet, digitally active small and medium sized enterprises (SME) face numerous security risks. When SMEs join networks, business ideas and malicious activities may inte...
We present a very efficient multi-party computation protocol unconditionally secure against an active adversary. The security is maximal, i.e., active corruption of up to t < n/...
It is widely recognized that today's Internet traffic is mostly carried by a relatively small number of elephant flows while mice flows constitute up to 80% of all active flow...
A new method for the analysis of 3D medical images is introduced. The algorithm is based on Biological Models of ants known as Artificial Life models. Test images (lung Computed To...