In this paper, we propose a strategy for the automated and scheduled maintenance of a digital library collection. Existing systems require the user either to add new data manually...
Assuring information authenticity is an important issue in the field of information security. A new broadcast authentication protocol is proposed. The protocol is based on time sy...
— Forecasting the tide level in the Venezia lagoon is a very compelling task. In this work we propose a new approach to the learning of tide level time series based on the local ...
E. Canestrelli, P. Canestrelli, Marco Corazza, Mau...
In 1990, Boyar, Chaum, Damg˚ard and Pedersen introduced convertible undeniable signatures which limit the self-authenticating property of digital signatures but can be converted b...
An e-contract is a contract modeled, specified, executed, controlled and monitored by a software system. Econtract evolves over a period of time and there are many scenarios of ch...