While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
A suffix tree is a fundamental data structure for string searching algorithms. Unfortunately, when it comes to the use of suffix trees in real-life applications, the current metho...
Marina Barsky, Ulrike Stege, Alex Thomo, Chris Upt...
Stories play an important role in the collaborative project work of children and adults in intercultural computer clubs “come_IN”. They constitute the narrative framework for ...
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
This paper explores the impact of enterprise-wide processes and technologies on group relations and exchanges. We examine the use of Customer Relationship Management (CRM) tools i...
Melissa Cefkin, Jakita O. Thomas, Jeanette Blomber...