Security protocols are crucial to achieve trusted computing. However, designing security protocols is not easy and so security protocols are typically faulty and have to be repaire...
: Past research on Internet voting has been concentrated on two aspects. First, there are investigations to find the appropriate balance between anonymity and authentication. Secon...
: Human-Computer Interaction field in Spain has experienced a great expansion in the last few years, even if this happened with some delay in comparison with neighbour countries. T...
For experience-driven design to become an influential design strategy, much effort should be put into method development and elaborate case studies. In the present paper, we prese...
In current Field-Programmable-Logic Architecture (FPGA) design flows, it is very hard to control the routing of submodules. It is thus very hard to make an identical copy of an ex...