This paper studies an active underground economy which specializes in the commoditization of activities such as credit card fraud, identity theft, spamming, phishing, online crede...
Jason Franklin, Adrian Perrig, Vern Paxson, Stefan...
The increase in incidence of criminal, illegal and inappropriate computer behaviour has resulted in organisations forming specialist teams to investigate these behaviours. Academi...
The paper gives an overview of recent developments in Sweden concerning the communication and reception of the Open Access concept and the growth and co-ordination of digital acad...
This paper is a report of some of the findings in a study of how and what women in computer science learn using the Internet for communication with other women. The focus of this ...
In STOC’05, Ahn, Hopper and Langford introduced the notion of covert computation. A covert computation protocol is one in which parties can run a protocol without knowing if oth...