Online publications are becoming an important information source. Due to the variety of standards and other forms of best practices used in composing online publications, preserva...
The first practical public key cryptosystem to be published, the Diffie-Hellman key exchange algorithm, was based on the assumption that discrete logarithms are hard to compute. T...
Abstract. Consider the RSA public key cryptosystem with the parameters N = pq, q < p < 2q, public encryption exponent e and private decryption exponent d. In this paper, cryp...
In this paper, we investigate the components of a Research 2.0 infrastructure. We propose building blocks and their concrete implementation to leverage Research 2.0 practice and te...
Thomas Daniel Ullmann, Fridolin Wild, Peter Scott,...
There is growing public concern about personal data collected by both private and public sectors. People have very little control over what kinds of data are stored and how such da...