We investigate whether security of multiparty computation in the information-theoretic setting implies their security under concurrent composition. We show that security in the sta...
We describe the information security aspects of logistical networking. The security model adopted by logistical networking is an end-to-end model that provides tunable security le...
Micah Beck, James S. Plank, Jeremy Millar, Scott A...
In this paper, we propose a framework for QualityDriven Delivery (QDD) in distributed multimedia environments. Quality-driven delivery refers to the capacity of a system to delive...
The paper provides an overview of available web applications and Web Services security vulnerability models and proposes a classification of the potential Grid and Web Services at...
Yuri Demchenko, Leon Gommans, Cees T. A. M. de Laa...
Abstract. We present a segmentation method for vessels using an implicit deformable model with a soft shape prior. Blood vessels are challenging structures to segment due to their ...