Abstract IT security incidents pose a major threat to the efficient execution of corporate strategies. Although, information security standards provide a holistic approach to mitig...
In this paper, we present our implementation of a stateful public key encryption (stateful PKE) scheme in the wireless sensor network (WSN) environment. In order to reduce the com...
Joonsang Baek, Han Chiang Tan, Jianying Zhou, Jun ...
Abstract. This paper introduces the audio part of the 2010 communitybased Signal Separation Evaluation Campaign (SiSEC2010). Seven speech and music datasets were contributed, which...
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...