نشرت في: 2007
The pattern equations method is extended to solving three-dimensional problems of wave diffraction by an ensemble of bodies. The method is based on th...
نشرت في: September 2011
Protecting end users from security threats is an extremely difficult, but increasingly critical, problem. Traditional security models that focused on...
In this article we introduce a technique, guaranteeing access pattern privacy against a computationally bounded adversary, in outsourced data storage...
Phishing is a plague in cyberspace. Typically, phish detection methods either use human-verified URL blacklists or exploit Web page features via mach...
The problem of scattering of a Rayleigh wave by a chain of identical closely spaced monopole–dipole resonators with friction is considered. The values...