In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for...
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan ...
Agents can personalize otherwise impersonal computational systems. The World Wide Web presents the same appearance to every user regardless of that user’s past activity. Web Bro...
Both Robots and Personal Computers established new markets about 30 years ago and were enabling factors in Automation and Information Technology. However, while you can see Person...
Martin Wojtczyk, Michael Marszalek, Alois Knoll, R...
We consider a parameterized family of closed planar curves and introduce an evolution process for identifying a member of the family that approximates a given unorganized point cl...
As the mobility of people increases, anytime, anywhere computing has become a must. The appearance of powerful portable computers, along with advancement in wireless communication...