Given the widespread intimidation state of affairs, there is a gripping want to enlarge architectures, algorithms, and protocols to apprehend a trustworthy network infrastructure....
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed systems, and shows how a parameterization of the framework can be used to reas...
Marianne Winslett, Charles C. Zhang, Piero A. Bona...
This paper presents a domain-independent architecture for facilitating visual problem solving between robots or softbots and humans. The architecture denes virtual and human agen...
The tragic events of September 11th have caused drastic effects on many aspects of society. Academics in the fields of computational and information science have been called upon ...
A general method to secure cryptographic algorithm implementations against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking...