Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Purpose – The purpose of this paper is to outline the development of the institutional repository of Utrecht University, the Igitur Archive. The Utrecht repository is unique for...
The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main rea...
Svetlana Radosavac, John S. Baras, Iordanis Koutso...
Turbulence is in the nature of business environments. Changes brought about because of different requirements such as social, political, technical and economic, exert pressures on ...