We investigate the darknet – a collection of networks and technologies used to share digital content. The darknet is not a separate physical network but an application and protoc...
Peter Biddle, Paul England, Marcus Peinado, Bryan ...
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
Scenarios are widely and successfully used to discover requirements for software-intensive systems. Recent advances in mobile computing technologies mean that mobile tools can sup...
Display environments for presentations are becoming diverse, and it is common to have multiple displays in the same room. We present a system to edit and give presentations using m...
Querying and searching the Web is an important research field which has drawn a number of concepts from databases and information retrieval fields, but has added its own models, ...