The main purpose of this paper is to show that public key encryption can be secure against the "encryption emulation" attack (on the sender's encryption) by computat...
Topological relations between geographic regions are of interest in many applications. When the exact boundaries of regions are not available, such relations can be established by...
Steven Schockaert, Philip D. Smart, Alia I. Abdelm...
In this paper, we argue that implementing the grand vision of the Semantic Web would greatly benefit from a service which can enable the reuse of globally unique URIs across semant...
Accessing structured data such as that encoded in ontologies and knowledge bases can be done using either syntactically complex formal query languages like SPARQL or complicated fo...
Predicate encryption is a new paradigm for public-key encryption generalizing, among other things, identity-based encryption. In a predicate encryption scheme, secret keys corresp...