Abstract. Effective deployment and utilisation of limited and constrained intelligence resources — including sensors and other sources — is seen as a key issue in modern multin...
This paper discusses the security of a leakage-resilient stream cipher presented at FOCS 2008, instantiated in a practical setting. Based on a case study, we put forward implementa...
We have designed and built a mobile emotional messaging system named eMoto. With it, users can compose messages through using emotion-related gestures as input, rendering a backgr...
Anyone who works with student employees knows that while it is often difficult to train sufficiently, it is of the utmost importance to have a qualified, knowledgeable staff. We w...
: The use of information technology (IT) in organizations has undergone dramatic changes the past 30 years. As a result, it has become increasingly common to adopt a services rathe...