: The proliferation of the Internet has revolutionized the way people work together for business. People located at remote places can collaborate across organizational and national...
Topic maps provide exciting opportunities not just to make information easier to find, but to increase the usability of software. In order to provide users with the information th...
Packet traces of operational Internet traffic are invaluable to network research, but public sharing of such traces is severely limited by the need to first remove all sensitive...
Distributed key generation is one of the most challenging tasks for threshold cryptosystems. Designing such a protocol and proving its security against a malicious, adaptive adver...
Perfectly secret message transmission can be realized with only partially secret and weakly correlated information shared by the parties as soon as this information allows for the ...