Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Abstract: The attack surface of a system represents the exposure of application objects to attackers and is affected primarily by architecture and design decisions. Given otherwise...
SOFIA (Safe Automatic Flight Back and Landing of Aircraft) project is a response to the challenge of developing concepts and techniques enabling the safe and automatic return to g...
The ATRIUM project aims to the automatic detection of threats hidden under clothes using millimetre-wave imaging. We describe a simulator of realistic millimetre-wave images and a...