Medical histories provide a rich resource for diagnoses and treatment. Similarly, consumers’ blog postings on health-related topics offer unique data for medical researchers, pr...
—In this paper we survey the state of the art in direct and indirect human computer interaction based biometrics. Direct HCI biometrics are based on abilities, style, preference,...
Context information is one of the most important data coming from mobile devices to add a value for the application execution. This paper introduces a context dissemination middle...
Guido Gehlen, Fahad Aijaz, Muhammad Sajjad, Bernha...
Signcryption is a new cryptographic primitive which simultaneously provides both confidentiality and authenticity. This paper proposes an improved signcryption scheme and a varia...
In this paper, we propose a new model for securing agent-based systems in which agents are equipped with reasoning capabilities allowing them to interact with each other. The agen...
Jamal Bentahar, John-Jules Ch. Meyer, Bernard Moul...
: There has been a lot of interest in recent years in the problems faced by cryptosystems due to side channel attacks. Algorithms for elliptic curve point scalar multiplication suc...
Andrew Byrne, Nicolas Meloni, Francis M. Crowe, Wi...
The United States Department of Defense (DoD) – one of the world’s largest heterogeneous and distributed enterprises – is transforming its information management and sharing...