To ensure that a trust negotiation succeeds whenever possible, authorization policy compliance checkers must be able to find all minimal sets of their owners' credentials tha...
Secure two-party computation protocol allows two players, Alice with secret input x and Bob with secret input y, to jointly execute an arbitrary program π(x, y) such that only th...
The RC4 stream cipher is the most widely used software based stream cipher. It is based on a secret internal state of N = 256 bytes and two pointers. This paper proposes an efficie...
- The design methodology and technique is presented to expand the power of commercial SPICE to simulate mixed electricalthermal-mechanical microsystems, consisting of motors being ...
— The design and the implementation of software for mobile computers and for pervasive computing environments entail several issues and lead to new requirements. Applications mus...
Davide Carboni, Andrea Piras, Stefano Sanna, Gavin...