With the growing popularity of cluster architectures in datacenters and the sophistication of computer attacks, the design of highly secure clusters has recently emerged as a crit...
Electronic authentication with a portable device such as a smart card has been receiving increasing attention. An explosion of papers argues security on such kind of authenticatio...
Abstract. We analyse the C anonymity protocol under the novel assumption that the attacker has independent knowledge on behavioural patterns of individual users. Und...
A general technique is proposed to deal with the formalization of intuition and human-oriented concepts in competition thinking games like chess, such as defensive play, attack, t...