Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Abstract. With the rise of global networks like the Internet the importance of workflow systems is growing. However, security questions in such environments often only address secu...
Abstract This paper investigates whether a machine can automatically learn the task of finding, within a large collection of candidate responses, the answers to questions. The lea...
Adam L. Berger, Rich Caruana, David Cohn, Dayne Fr...
Internet-based multi-agent systems call for new metaphors, abstractions, methodologies and enabling technologies specifically tailored to agent-oriented engineering. While coordin...
Abstract. Traditionally, cryptographic protocols are described as a sequence of steps, in each of which one principal sends a message to another. It is assumed that the fundamental...