We explored whether Fisher and Durrance’s [11] framework of information communities applies to online technical newsgroups and the impact of particular social types on informati...
We show that every construction of one-time signature schemes from a random oracle achieves black-box security at most 2(1+o(1))q , where q is the total number of oracle queries a...
A flooding-based search mechanism is often used in unstructured P2P systems. Although a flooding-based search mechanism is simple and easy to implement, it is vulnerable to overla...
Many user interfaces include history lists that help users retrieve temporally ordered information such as previously visited web pages, email messages, and recently used files. ...
E–mail is one of the most common ways to communicate, assuming, in some cases, up to 75% of a company’s communication, in which every employee spends about 90 minutes a day in ...