Many distributed systems manage some form of long-lived data, such as files or data bases. The performance and fault-tolerance of such systems may be enhanced if the repositories ...
We compare the method of Weil descent for solving the ECDLP, over extensions fields of composite degree in characteristic two, against the standard method of parallelised Pollard ...
Type-flaw attacks and multi-protocol attacks on security protocols have been frequently reported in the literature. Heather et al. and Guttman et al. proved that these could be pr...
The present study examines the relative importance of a series of known and expected factors that highly affect threat detection performance in aviation security X-ray screening. E...
Anton Bolfing, Tobias Halbherr, Adrian Schwaninger