In this paper, we describe a sequence of simple, yet efficient chosen-plaintext (or chosen-ciphertext) attacks against reduced-round versions of IDEA (with 2, 2.5, 3, 3.5, and 4 ro...
In daily life, people spend a lot of time in group activities, such as communication, debate, collaboration and consensus achieving for problem solving where creative ideas are exp...
Due to the wide deployment of sensor networks recently security in sensor networks has become a hot research topic. Popular ways to secure a sensor network are by including crypto...
Abstract. Nowadays, ontology is applied as an integral part of many applications in several domains, especially in the world of law. The ontology based judicial support system is b...
This work presents the core ideas for an approach that enables index tuning with no human intervention at all. SQL statements submitted to the database are monitored and indices a...