Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Valid models are central to the existence of Computer science as in most other disciplines, but at what point can one say that a model is valid and hence correct? is often taken t...
A considerable amount of research has already been conducted in the IT/IS evaluation arena, yet rewards remain elusive. This has been variously explained and in this paper we aim ...
To appropriately address the problem of large-scale distributed intrusion assessment/detection, issues such as information exchange, work division and coordination amongst various...
While supporting family communication has traditionally been a domain of interest for interaction designers, few research initiatives have explicitly investigated remote synchrono...