A number of key establishment protocols claim the property of forward secrecy, where the compromise of a longterm key does not result in the compromise of previously computed sess...
Abstract. Cooperative problem solving without communication is an oftenstudied field within multi-agent research. Realistic problems investigated in this particular field are compl...
Tibor Bosse, Mark Hoogendoorn, Catholijn M. Jonker
As mobile devices become location-aware, it will become possible to know when people are physically co-located and to incorporate this information into social software. Is this va...
Despite the proliferation of large-scale displays in the workplace, creating groupware applications that take advantage of their potential for collaboration and communication rema...
As interest in usable security spreads, the use of visual approaches in which the functioning of a distributed system is made visually available to end users is an approach that a...