Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Background: Analysis of inherited diseases and their associated phenotypes is of great importance to gain knowledge of underlying genetic interactions and could ultimately give cl...
Marco Masseroli, Osvaldo Galati, Mauro Manzotti, K...
Abstract--This paper investigates the impact of interuser non-orthogonality and asynchronous communication on the information-outage probability performance of multi-user decode-an...
Kanchan G. Vardhe, Daryl Reynolds, Matthew C. Vale...
Realizing high volume of data transmission in real time communication in a highly dynamic architecture like Mobile Ad hoc Networks (MANET) still remains a major point of research....
Romit Roy Choudhury, Krishna Paul, Somprakash Band...
Graphical password systems have received significant attention as one potential solution to the need for more usable authentication, but nearly all prior work makes the unrealisti...
Katherine Everitt, Tanya Bragin, James Fogarty, Ta...