We construct a stream-cipher SC whose implementation is secure even if a bounded amount of arbitrary (adaptively, adversarially chosen) information about the internal state of SC ...
—Communications are increasingly relying on peer– to–peer models of interaction in which all participating entities have the same level of authority. Such models allow develo...
Dimitris Glynos, Patroklos G. Argyroudis, Christos...
This paper describes the design of a test suite for thorough evaluation of web application scanners. Web application scanners are automated, black-box testing tools that examine w...
Elizabeth Fong, Romain Gaucher, Vadim Okun, Paul E...
This study focuses on exploring Internet literacy and social awareness as antecedents to Internet users’ attitudes towards government surveillance in the Internet environment. P...
— Keystroke dynamics exhibit people’s behavioral features which are similar to hand signatures. A major problem hindering the large scale deployment of this technology is its h...