: Cognitive informatics (CI) studies the natural intelligence and internal information processing mechanisms of the brain, as well as the processes involved in perception and cogni...
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Disaster prevention and management is a complicated task that often involves a tremendous volume of heterogeneous data from various resources. With its dynamic and distributed nat...
UCON is a highly flexible and expressive usage control model which allows an object owner to specify detailed usage control policies to be evaluated on a remote platform. Assuranc...
Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamlee...
Abstract. While code obfuscation attempts to hide certain characteristics of a program independently of an application, white-box cryptography (WBC) specifically focuses on softwa...