As access to hypermedia documents becomes generally available, it becomes increasingly important to understand how casual users search for information. We have studied search patt...
The UK government is fielding an architecture for secure electronic mail based on the NSA’s Message Security Protocol, with a key escrow scheme inspired by Diffie-Hellman. Attem...
Abstract. Non-interactive zero-knowledge (NIZK) proofs have been investigated in two models: the Public Parameter model and the Secret Parameter model. In the former, a public stri...
This paper chronicles the collaborative efforts of Valparaiso University’s IT department and main library over the past five years. Highlights of selected resources and services...
The DBMS performance might change by allocating resources and by performing a specific kind of workload. Database administrators should be able to identify relative resources that ...