This work presents a cryptographic analysis of AN.ON’s anonymization protocols. We have discovered three flaws of differing severity. The first is caused by the fact that the ...
An experimental analysis of three acquisition scenarios for face recognition at a distance is reported, namely: close, medium, and far distance between camera and query face, the t...
—In wireless networks, node cooperation has been exploited as a data relaying mechanism for decades. However, the wireless channel allows for much richer interaction among nodes....
Long Term Evolution (LTE) is the latest step towards the 4th generation (4G) of radio technologies designed to increase the capacity and speed of mobile communications. To support ...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...
The addition of a cross-cutting concern in a program, through aspect weaving, has an impact on its existing behaviors. If test cases exist for the program, it is necessary to ident...