Abstract. This paper reconsiders the established Merkle-Damg˚ard design principle for iterated hash functions. The internal state size w of an iterated n-bit hash function is trea...
The poster introduces the design principles and practices for the Knowledge-Practices Laboratory (KP-Lab) project. KP-Lab is based on technological, theoretical, pedagogical, and s...
Application integration is a major trend in information technology today. In this paper we present a number of principles for the design, validation and presentation of process mod...
This paper explores the concept of malware for Radio Frequency Identification (RFID) systems -- including RFID exploits, RFID worms, and RFID viruses. We present RFID malware desi...
Melanie R. Rieback, Patrick N. D. Simpson, Bruno C...
The significance of simulation modeling at multiple levels, scales, and perspectives is well recognized. However, existing proposals for developing such models are often applicati...
Levent Yilmaz, Alvin Lim, Simon Bowen, Tuncer I. &...