Abstract. Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper fo...
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
In this paper we propose that a metaphor can be used to represent domains that are not easily quantifiable. The metaphor then can be used as an interface to communicate informatio...
This paper studies how Computer Graphics is taught and proposes a course on 2D Computer Graphics and Image Processing as an alternative to the traditional 3D Computer Graphics cou...