In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the netwo...
The principle of information security safeguards is a key information principle contained in every privacy legislation measure, framework, and guideline. This principle requires d...
Machine learning techniques are widely used in negotiation systems. To get more accurate and satisfactory learning results, negotiation parties have the desire to employ learning ...
Secure group communication protocols, in particular multi-party key agreement and update algorithms, help promote traditional and new Internet multi-party applications such as vid...