One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Background: The huge amount of biological information, its distribution over the Internet and the heterogeneity of available software tools makes the adoption of new data integrat...
Paolo Romano 0001, Ezio Bartocci, Guglielmo Bertol...
The seamless integration of people, devices and computation will soon become part of our daily life. Sensors, actuators, wireless networks and ubiquitous devices powered by intelli...
This paper presents an interactive analysis and visualization framework for behavior histories, called mPATH framework. In ubiquitous computing environment, it is possible to infe...