Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
Abstract. Network worms are malicious programs that spread automatically across networks by exploiting vulnerabilities that affect a large number of hosts. Because of the speed at...
With the growth of digital music, content-based music retrieval (CBMR) has attracted increasingly attention. For most CBMR systems, the task is to return music objects similar to ...
: Multimedia and Hypermedia technologies can be successfully used in education and rehabilitation for cognitively disabled persons. In particular, storytelling has always proved su...
Thimoty Barbieri, Antonio Bianchi, Licia Sbattella
Graphical information is very important in common information publishing. For visually impaired users this information is usually not accessible. Scalable Vector Graphics, a recomm...