The Technology Acceptance Model (TAM) predicts whether users will ultimately use software applications based upon causal relationships among belief and attitudinal constructs that...
A key idea in cryptography is using hard functions in order to obtain secure schemes. The theory of hard functions (e.g. one-way functions) has been a great success story, and the ...
AbstractSpam, the electronic equivalent of junk mail, affects over 600 million users worldwide. Even as anti-spam solutions change to limit the amount of spam sent to users, the se...
The Netlib software repository was created in 1984 to facilitate quick distribution of public domain software routines for use in scientific computation. The Numerical Analysis Ne...
Jack Dongarra, Gene H. Golub, Eric Grosse, Cleve B...
Non-repudiation protocols aim at preventing parties in a communication from falsely denying having taken part in that communication; for example, a non-repudiation protocol for di...