When you sit in a Computer Science lecture at any university in the western world, what are the chances that the person sitting next to you will be a woman? Furthermore, what are ...
Abstract. This paper contains the summary of a panel on authentication in constrained environments held during the Secure MADNES’05 Workshop. These were transcribed from hand-wri...
Mike Burmester, Virgil D. Gligor, Evangelos Kranak...
I have been designing and building applications, including the databases used by those applications, for several decades now. I have seen similar problems approached by different d...
With the advent and growth of the Web, hypermedia information systems have propagated within and beyond organizations. Much concern has been expressed about the quality of hyperme...
Working in a team environment can be either an efficient and productive means of completing projects or a nightmare where the project never seems to end. Most of us have been a pa...