Crime on the Internet has become a formidable challenge for university information technology and student judicial systems. The nature of university computing requires a relativel...
Abstract. Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be mitigated if access control mechanisms supported...
After decades of expansion, Internet became an essential tool useful for professionals and private individuals providing a large range of services like emailing, management of ban...
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Abstract. Security documents (currency, treasury bills, stocks, bonds, birth certificates, etc.) provide an interesting problem space for investigating information hiding. Recent a...