It is usually assumed that Honeynets are hard to detect and that attempts to detect or disable them can be unconditionally monitored. We scrutinize this assumption and demonstrate ...
Maximillian Dornseif, Thorsten Holz, Christian N. ...
Abstract. The paper study counter-dependent pseudorandom number generators based on m-variate (m > 1) ergodic mappings of the space of 2-adic integers Z2. The sequence of intern...
The author taught two courses on cryptography, one at Duke University aimed at non-mathematics majors and one at Rose-Hulman Institute of Technology aimed at mathematics and comput...
Lexical resources such as WordNet and the EDR electronic dictionary (EDR) have been used in several NLP tasks. Probably partly due to the fact that the EDR is not freely available...
Lonneke van der Plas, Vincenzo Pallotta, Martin Ra...
In this article, we are interested in the annotation of transcriptions of human-human dialogue taken from meeting records. We first propose a meeting content model where conversat...
Vincenzo Pallotta, Hatem Ghorbel, Patrick Ruch, Gi...