In the well-known "prisoners' problem", a representative example of steganography, two persons attempt to communicate covertly without alerting the warden. One appr...
Facility layouts of existing or proposed production systems often form the basis of a dynamic simulation study to prove the design concept and to determine if the required through...
We study the problem of Secure Multi-party Computation (SMC) in a model where individual processes contain a tamper-proof security module, and introduce the TrustedPals framework, ...
Milan Fort, Felix C. Freiling, Lucia Draque Penso,...
With the rapid expansion of the Internet, the implementation of agent technology in electronic commerce (e-commerce) becomes very popular, which provides a promising field for the...
The similarity search has become a fundamental computational task in many applications. One of the mathematical models of the similarity – the metric space – has drawn attenti...