This article addresses a problem with copy-protecting a large collection of electronic content. The notion and severity of a generic attack are raised in the context of Adams and Z...
: New information and communication technologies within the Administration give rise to a series of important challenges: to select and use the various telematic and computer-relat...
Virtual Institutions are Virtual Worlds with normative regulation of participants’ interactions. This paradigm is based on normative multiagent systems and is technologically su...
The UK government is fielding an architecture for secure electronic mail based on the NSA’s Message Security Protocol, with a key escrow scheme inspired by Diffie-Hellman. Attem...
To understand the subjective documents, for example, public comments on the government’s proposed regulation, opinion identification and classification is required. Rather than ...
Namhee Kwon, Liang Zhou, Eduard H. Hovy, Stuart W....