Malware attacks are a significant part of the new software security threats detected each year. Intel Software Guard Extensions (SGX) are a set of hardware instructions introduced by Intel in their recent lines of processors that are intended to provide a ...
In parallel to their most frequent application as an auxiliary dam spillway, piano key weirs (PKWs) are also installed on low-head barrages in combination with run-off-the-river power plants. Their efficient rating curve, advantageous behavior under driftw ...
Protection of one's intellectual property is a topic with important technological and legal facets. We provide mechanisms for establishing the ownership of a dataset consisting of multiple objects. The algorithms also preserve important properties of the d ...
The participatory sensing paradigm, through the growing availability of cheap sensors in mobile devices, enables applications of great social and business interest, e.g., electrosmog exposure measurement and early earthquake detection. However, users' priv ...
Nowadays, network infrastructures are increasingly used in support to commercialization of digital multimedia content. Such kind of non-material goods, namely videos, music, still images and any other type of multi-media information are ready for the migra ...