One of the promising applications of IEEE 802.16 (WiMAX)-based wireless mesh/relay networks is to provide infrastructure/backhaul support for IEEE 802.11based mobile hotspots. In ...
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
This paper brings together two recent developments in image analysis. We consider a new mathematical framework that provides illumination invariant descriptors for face detection....
Abstract—This paper describes a set of innovative attributebased checks for defending against phishing attacks1 . We explain a number of anti-phishing algorithms implemented as p...
GRM was originally designed and implemented as part of the P-GRADE graphical parallel program development environment running on supercomputers and clusters. In the framework of th...