The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
—With the popularity of voting systems in cyberspace, there are growing evidence that the current voting systems can be manipulated by fake votes. This problem has attracted many...
Qinyuan Feng, Yan Lindsay Sun, Ling Liu, Yafei Yan...
: This paper begins with a long-term view of the development of cyberspace. This includes a brief examination of the worldview of a 16th-century mapmaker and over 4000 years of dev...
Most existing research about online trust assumes static trust relations between users. As we are informed by social sciences, trust evolves as humans interact. Little work exists...
Jiliang Tang, Huan Liu, Huiji Gao, Atish Das Sarma...
The importance of face-to-face informal communication is well recognized. The ‘irori’ is a Japanese-traditional little sitting space or room with a fire burning which affords r...