Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
We consider a problem which was stated in a request for comments made by NIST in the FIPS97 document. The question is the following: Can we have a digital signature public key infr...
Background: Microarray studies in cancer compare expression levels between two or more sample groups on thousands of genes. Data analysis follows a population-level approach (e.g....
James Lyons-Weiler, Satish Patel, Michael J. Becic...
The fundamental challenge for social computing is to contribute to fostering communities in which humans can transcend the limitation of the unaided, individual human mind by help...
The Research Consortium in Speckled Computing is a multidisciplinary grouping of computer scientists, electronic engineers, physicists and electrochemists with the aim of realising...
D. K. Arvind, K. Elgaid, T. Krauss, A. Paterson, R...