In the upcoming high transmission rate system, based on code division multiple access, standard multi-user detection methods are restricted because of performance and implementati...
We introduce the notion of key stretching, a mechanism to convert short s-bit keys into longer keys, such that the complexity required to brute-force search a s + t-bit keyspace is...
John Kelsey, Bruce Schneier, Chris Hall, David Wag...
Tool environments supporting the development of complex products need to be open and flexible. These requirements cannot be fulfilled in an adequate way by predefined coordinat...
The management and querying of workflow provenance data underpins a collection of activities, including the analysis of workflow results, and the debugging of workflows or service...
The increasing complexity of software applications requires improved software development techniques in order to cope with, a.o., software reuse and evolution, the management of he...
Aram Hovsepyan, Stefan Van Baelen, Yolande Berbers...