Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
Recommender systems are used to predict user preferences for products or services. In order to seek better prediction techniques, data owners of recommender systems such as Netfli...
Chih-Cheng Chang, Brian Thompson, Hui (Wendy) Wang...
This paper presents a quality ontology that formalizes all the needed knowledge for the realization of a multi-perspective and adaptive evaluation of e-government services. Differe...
We introduce a formal language for multi-agent systems based on new modal operators. The modal operators express concurrency at the syntactic level. Operators containing quantifie...