Theories of inter-organisational co-ordination propose that information processing capabilities (structure, process and technology) must be aligned with information processing nee...
Abstract— Encounter-based network is a frequentlydisconnected wireless ad-hoc network requiring immediate neighbors to store and forward aggregated data for information dissemina...
Much work is going into securing the public key infrastructure (PKI). Various models for trust exist; Pretty Good Privacy (PGP) and the Progressive-Constraint Trust model are exam...
: For an electronic election to be fully democratic there is a need for security mechanisms that will assure the privacy of the voters. With receipt-free electronic voting, a voter...
Emmanouil Magkos, Mike Burmester, Vassilios Chriss...
With the discovery of new exploit techniques, novel protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Random...