We revisit the problem of constructing efficient secure two-party protocols for the problems of setintersection and set-union, focusing on the model of malicious parties. Our main...
Abstract. For a fixed integer k 0, a k-transmitter is an omnidirectional wireless transmitter with an infinite broadcast range that is able to penetrate up to k "walls",...
This note studies nonlinear systems evolving on manifolds with a finite number of asymptotically stable equilibria and a Lyapunov function which strictly decreases outside equilibr...
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Companies that are present at multiple online locations may have difficulty staffing them adequately in terms of helpdesk services with efficient use of human resources. In this pa...
Leonel Morgado, Paulo Reis, Fausto de Carvalho, Ti...