We propose a notarized federated identity management model that supports efficient user authentication when providers are unknown to each other. Our model introduces a notary servi...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
Good public-key infrastructures (PKIs) are essential to make electronic commerce secure. Quite recently, certificate verification trees (CVTs) have been introduced as a tool for im...
A small portable network forensic evidence collection device is presented which is built using inexpensive embedded hardware and open source software. The device oers several mode...
act 11 We analyze and compare two different methods for unsupervised extractive spontaneous speech summarization in the meeting 12 domain. Based on utterance comparison, we introdu...
The Vaccine and Related Biologic Products Advisory Committee meets at least once a year to decide the composition of the influenza vaccine in the U.S. Past evidence suggests that ...