The XML technologies have brought a lot of new ideas and abilities in the field of information management systems. Nowadays, XML is used almost everywhere: from small configurati...
NETCICATS is a software system for empirically evaluating network-conscious image compression, an approach that does not simply optimize compression, but which optimizes overall pe...
We propose an economic approach to Sybil attack detection. In our Informant protocol, a detective offers a reward for Sybils to reveal themselves. The detective accepts from one i...
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Policies which address security and privacy are pervasive parts of both technical and social systems, and technology to enable both organizations and individuals to create and man...
Maritza Johnson, John Karat, Clare-Marie Karat, Ke...