Undeniable signatures were introduced in 1989 by Chaum and van Antwerpen to limit the self-authenticating property of digital signatures. An extended concept – the convertible un...
With the proliferation of robotics in industry, education and entertainment, artificial intelligent robots challenge the way we think about relationships between humans and machin...
Identity-based (ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate securit...
This paper includes a review of mobile applications used in museum environments, focusing on the notion of context and its constituent dimensions. Museums are a representative exa...
Dimitris Raptis, Nikolaos K. Tselios, Nikolaos M. ...
Abstract In order to extend the modeling capabilities of rewriting systems, it is rather natural to consider that the firing of rules can be subject to some probabilistic laws. Co...