An expectation of a signature system is that a signatory cannot dispute a signature. Aiming at this, the following questions arise: Can documents in electronic commerce on the Inte...
The interdisciplinary project uses a variety of research designs, data collection methodologies, and analysis techniques and two ballot designs to assess five commercially availab...
Paul S. Herrnson, Richard G. Niemi, Benjamin B. Be...
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
This research aims at studying the effects of exchanging information during the learning process in Multiagent Systems. The concept of advice-exchange, introduced in (Nunes and Ol...
Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...