Many different rules for decision making have been introduced in the literature. We show that a notion of generalized expected utility proposed in [Chu and Halpern 2003] is a uni...
Abstract-- The identity-based encryption (IBE) is one of the most important primitives in cryptography, and various security notions of IBE (e.g., IND-ID-CCA2, NM-ID-CCA2, IND-sID-...
This paper reports on a design case study for a mobile learning (M-learning) environment that follows a usercentred design approach. This development of the system applied an M-le...
We propose a scheme for electronic cash based on symmetric primitives. The scheme is secure in the framework for universal composability assuming the existence of a symmetric CCA2-...
The goal of the paper is to explicate some common formal logic underlying various notational systems used in visual modeling. The idea is to treat the notational diversity as the d...
Zinovy Diskin, Boris Kadish, Frank Piessens, Micha...