In recent years, large amount of data modeled by graphs, namely graph data, have been collected in various domains. Efficiently processing queries on graph databases has attracted...
The goal of secure multiparty computation is to transform a given protocol involving a trusted party into a protocol without need for the trusted party, by simulating the party am...
Nowadays, almost all public administration plan to establish processes with electronic signatures. For such processes, there are no standardized system models with test cases. We a...
B. Lapken, Frank Losemann, Thomas Engel, Christoph...
We consider security properties of cryptographic protocols that can be modeled using the notion of trace equivalence. The notion of equivalence is crucial when specifying privacy-...
Abstract. Integration of GIS and hydrologic models has been a common approach for monitoring our ever-changing hydrologic system. One important issue in adapting such an approach i...
Chen-Chieh Feng, Thomas Bittner, Douglas M. Flewel...