Distributed software development support systems typically use a centralized client-server architecture. This approach has some drawbacks such as the participants may experience l...
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the...
OASIS Archive project aimed at developing a system for the universal presentation of Media Art works independent of location. The goal was to establish a user-friendly search syste...
Juergen Enge, Andrzej Glowacz, Michal Grega, Mikol...
Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service. Even when using a Public Key Infrastructure as X.509, such s...
Altair Olivo Santin, Joni da Silva Fraga, Carlos M...
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the...