Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptiv...
This paper proposes and validates a theory of physician resistance toward IT usage by drawing on prior research in the resistance to change literature and a recent dual-factor mod...
Setting up a simulation model is more than writing down state equations and running them on a computer. A lot of conceptual information about the physics and engineering aspects o...
Arno Breunese, Jan L. Top, Jan F. Broenink, J. M. ...
This paper proposes the first inner product encryption (IPE) scheme that is adaptively secure and fully attribute-hiding (attribute-hiding in the sense of the definition by Katz...
Some of the non interference properties studied in [4, 6, 18] for information flow analysis in computer systems, notably Æ , are reformulated here in a realtime setting. This is...