A number of security systems, from Chip-and-PIN payment cards to contactless subway and train tokens, as well as secure localization systems, are vulnerable to relay attacks. Encry...
Markov chains have been used to model web usages and served as the basis for statistical testing, performance evaluation, and reliability analysis. However, most of such applicati...
My dissertation work focuses on the motivation for adopting emergency response technology in community settings. The main purpose of my study is to understand various factors that...
This paper proposes a system to facilitate exchange of information by automatically finding experts, competent in answering a given question. Our objective is to provide an onlin...
In this paper we discuss Liau's logic of Belief, Inform and Trust (BIT), which captures the use of trust to infer beliefs from acquired information. However, the logic does no...
Mehdi Dastani, Andreas Herzig, Joris Hulstijn, Lee...