Three attacks on the DES with a reduced number of rounds in the Cipher Feedback Mode (CFB) are studied, namely a meet in the middle attack, a differential attack, and a linear att...
Bart Preneel, Marnix Nuttin, Vincent Rijmen, Johan...
This paper proposes HVEM-Grid, which is the cornerstone for tele-instrumentation infrastructure. The proposed architecture is mainly oriented for people whose primary work is to ge...
Hyuck Han, Hyungsoo Jung, Heon Young Yeom, Hee S. ...
This paper reports on an exploratory experimental study of the relationships between physical movement and desired visual information in the performance of video-mediated collabor...
Abhishek Ranjan, Jeremy P. Birnholtz, Ravin Balakr...
Historical data suggest that returns of stocks and indices are not distributed independent and identically Normal, as is commonly assumed. Instead, returns of financial assets are...
A recent trend in Ubiquitous Computing is that embedded software (e.g. in production machines, wired or wireless networked sensors and actuators, or RFID readers) directly offers W...