Token-controlled public key encryption (TCPKE) schemes, introduced in [1], offer many possibilities of application in financial or legal scenarios. Roughly speaking, in a TCPKE s...
We show how to route on very large public transportation networks (up to half a billion arcs) with average query times of a few milliseconds. We take into account many realistic fe...
Hannah Bast, Erik Carlsson, Arno Eigenwillig, Robe...
In order to address privacy concerns, many social media websites allow users to hide their personal profiles from the public. In this work, we show how an adversary can exploit an...
An action research project in the state administration of Schleswig-Holstein (Germany) seeks to answer the following questions: How can we organize and present edocuments so that ...
Federal agencies implement laws passed by the Congress by creating rules and regulations that can be applied in practice. During this process, staffs at the various agencies may r...