In this paper, we present the cryptanalysis of a public key scheme based on a system of multivariate polynomial equations, the ”tractable rational map” cryptosystem. We show co...
Challenging usage policy issues can arise within virtual organizations (VOs) that integrate participants and resources spanning multiple physical institutions. Participants may wi...
Protocol narrations are an informal means to describe, in an idealistic manner, the functioning of cryptographic protocols as a single intended sequence of cryptographic message ex...
While much attention is paid to defining and examining interactions with links, little is paid to the front end: the anchor. We examine what an anchor is, describe six anchor prop...
This talk discusses how to strike a good balance between making the user an active co-constructor of system functionality versus making a too strong, interpretative design that do...