Informally, a public-key steganography protocol allows two parties, who have never met or exchanged a secret, to send hidden messages over a public channel so that an adversary can...
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private k...
Abstract. The SPIRIT search engine provides a test bed for the development of web search technology that is specialised for access to geographical information. Major components inc...
Christopher B. Jones, Alia I. Abdelmoty, David Fin...
We explore the social and technical design issues involved in tracking the effectiveness of educational and therapeutic interventions for children with autism (CWA). Automated capt...
Gillian R. Hayes, Julie A. Kientz, Khai N. Truong,...
Digital libraries have been rather successful in supporting learning activities by providing learners with access to information and knowledge. However, this level of support is pa...
Ee-Peng Lim, Aixin Sun, Zehua Liu, John G. Hedberg...