The emergence of new information and communication system technologies allow the appearance of new techniques of data processing. Thus, it is increasingly difficult to user to find...
A classical construction of stream ciphers is to combine several LFSRs and a highly non-linear Boolean function f. Their security is usually analysed in terms of correlation attack...
Engineering design search and optimisation is a computationally expensive and data intensive process. Grid technology offers great potential to increase the efficiency of this proc...
Jasmin L. Wason, Marc Molinari, Zhuoan Jiao, Simon...
As in traditional commerce, parties to a contract in ebusiness environments are expected to operate in good faith and comply with mutually agreed terms of contract. It may be the ...
Access control is one of the key requirements in enterprise security. A number of approaches in distributed systems have been designed that support various (new) paradigms such as...
Pascal Fenkam, Schahram Dustdar, Engin Kirda, Gera...