This work addresses the problem of information leakage of cryptographic devices, by using the reconfiguration technique allied to an RNS based arithmetic. The information leaked b...
Stateful, in-depth, inline traffic analysis for intrusion detection and prevention is growing increasingly more difficult as the data rates of modern networks rise. Yet it remai...
Abstract. We consider models of emergence, adding downward causation to conventional models where causation permeates from low-level elements to high-level behaviour. We describe a...
Fiona Polack, Susan Stepney, Heather R. Turner, Pe...
Software configuration management (SCM) products have evolved over the years and have become large and powerful, but they are not flexible enough to allow the user to pick the kind...
Abstract. In this paper we discuss the problem of handling many classification schemes within the context of a single digital library concurrently, which we term multischeming. We...