Abstract. In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in whic...
The use of Collaborative Virtual Geographic Environments (CVGE) is one of the most promising uses of virtual reality in geographic field. Data collaboration can support multi-direc...
Contextual integrity is a conceptual framework for understanding privacy expectations and their implications developed in the literature on law, public policy, and political philo...
Adam Barth, Anupam Datta, John C. Mitchell, Helen ...
Modelling security policies requires means to specify permissions and prohibitions. However, this is generally not sufficient to express security properties such as availability ...
Abstract. This paper describes the development of a real-time perceptive user interface. Two cameras are used to detect a user’s head, eyes, hand, fingers and gestures. These cu...
Michael Van den Bergh, Ward Servaes, Geert Caenen,...