To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
While networking technology facilitates the use of online services such as real-time instant messaging and anywhere-anytime multiplayer gaming, societal and ethical issues can inf...
The management of one-to-one business interaction is challenged by the latency in the acquisition of information about the individual customer's preferences. Although sharing ...
Barbara Negro, Angelo Difino, Fabio Bellifemine, G...
In Linux, applications like su and login currently run as root in order to access authentication information and set or alter the identity of the process. In such cases, if the ap...
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...