In this study, we argue that users participating in the design process will form the participation as a function of their professional role, but also as a function of their identi...
Social resources like trust and shared identity make it easier for people to work and play together. Such social resources are sometimes referred to as social capital. Thirty year...
Paul Resnick, Tora K. Bikson, Elizabeth D. Mynatt,...
We initiate the study of security for key-dependent messages (KDM), sometimes also known as “circular” or “clique” security, in the setting of identity-based encryption (I...
—We propose a novel scenario called “writer retrieval” consisting in the retrieval from a set of documents all those produced by the same writer. The retrieval is based on a ...