Pairing-based cryptosystems (PBC) have been attracted by researchers in cryptography. Some implementations show that PBC are relatively slower than the standard public key cryptosy...
For senior executives, information security is a basic requirement for business success. Yet, despite being well-motivated, top managers often have only a superficial understandin...
Jorma Kajava, Juhani Anttila, Rauno Varonen, Reijo...
In hardware implementation for the finite field, the use of normal basis has several advantages, especially the optimal normal basis is the most efficient to hardware implementati...
Chang Han Kim, Yongtae Kim, Sung Yeon Ji, IlWhan P...
In this paper, we propose a new variational decomposition model which splits an image into two components: a first one containing the structure and a second one the texture or nois...
The emerging ubiquitous computing is changing the current computing paradigm, and it lets the ubiquitous RFID applications consistently and independently utilize the sensed inform...
Dongwon Jeong, Keunhwan Jeon, Jang-won Kim, Jinhyu...
Autonomic Computing Systems (ACS) are expected to achieve the same level of self-regulation and pervasiveness as human autonomic systems. Because of the features of ACS, the tradit...
Abstract-- Beside their stunning graphics, modern entertainment systems feature ever-higher levels of immersive userinteraction. Today, this is mostly achieved by virtual (VR) and ...
Ernst A. Heinz, Kai S. Kunze, Matthias Gruber, Dav...