Digital Preservation has been recognized as a key challenge in providing trusted information and sustainable eGovernment services. However, there has been little convergence on ali...
We study the problem of searching on encrypted data, where the search is performed using a plaintext message or a keyword, rather than a message-specific trapdoor as done by state...
—We take a new, scenario-based look at evaluation in information visualization. Our seven scenarios, evaluating visual data analysis and reasoning, evaluating user performance, e...
Heidi Lam, Enrico Bertini, Petra Isenberg, Catheri...
Almost any cryptographic scheme can be described by tweakable polynomials over GF(2), which contain both secret variables (e.g., key bits) and public variables (e.g., plaintext bit...
The High-Energy Physics (HEP) community spearheaded Open Access with over half a century of dissemination of pre-prints, culminating in the arXiv system. It is now proposing an Op...