Abstract—Several recently proposed multicast protocols use inpacket Bloom filters to encode multicast trees. These mechanisms are in principle highly scalable because no per-fl...
This paper proposes spongent – a family of lightweight hash functions with hash sizes of 88 (for preimage resistance only), 128, 160, 224, and 256 bits based on a sponge construc...
Andrey Bogdanov, Miroslav Knezevic, Gregor Leander...
—Recent protocols are become increasingly complex, and lead to further level of complexity when used in combination, often resulting in ambiguous behavior. This paper, starting f...
Telemaco Melia, Amardeo Sarma, Rui L. Aguiar, Diet...
In this study we have tackled the NP-hard problem of academic class scheduling (or timetabling) at the university level. We have investigated a variety of approaches based on simu...
M. A. Saleh Elmohamed, Paul D. Coddington, Geoffre...
Secure system design, veri cation and validation is often a daunting task, involving the merger of various protection mechanisms in conjunction with system security policy and con...