An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
The identity of “Deep Throat”, a pseudonym of the information source in the Watergate scandal, remained mysterious for more than three decades. In 2005, an ex-FBI official cla...
Hidden services were deployed on the Tor anonymous communication network in 2004. Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Wit...
A consistent theoretical and practical challenge in the design of socio-technical systems is that of motivating users to participate in and contribute to them. This study examines...
Cliff Lampe, Rick Wash, Alcides Velasquez, Elif Oz...
Social factors, such as status differences, may prevent some members from participating in group decisions. Computerized group decision support systems (GDSSs) can reduce social i...
John Davis, Melora Zaner, Shelly Farnham, Cezary M...