This paper identifies certain privacy threats that apply to anonymous credential systems. The focus is on timing attacks that apply even if the system is cryptographically secure....
This position paper aims to address most of the “challenges” suggested by the conference’s CFP plus a few others. The style is deliberately informal and colloquial, occasiona...
The aim of the research is to investigate techniques that support efficient service scheduling algorithms in a service-oriented fault-tolerant real-time distributed system. Techni...
In this article we present the outline of a novel processor architecture aimed to the design of systems that more closely resemble, within the limitations imposed by the capabilit...
Abstract. The aim of the article is to inform about the INEX initiative, its testing data set, actual results, and future plans. We discuss and demonstrate possible utilization of ...