Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
We present a novel multiscale image representation belonging to the class of multiscale multiplicative decompositions, which we term Poisson-Haar transform. The proposed represent...
XRL (eXchangeable Routing Language) is an instancebased workflow language that uses XML for the representation of process definitions and Petri nets for its semantics. Since XRL i...
Wil M. P. van der Aalst, H. M. W. Verbeek, A. Kuma...
: Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special...
The design of cryptographic hash functions is a very complex and failure-prone process. For this reason, this paper puts forward a completely modular and fault-tolerant approach to...