Abstract—The development of modern communication technologies fosters human networks (HUNETs)—an information dissemination platform comprised of human-carried wirelessenabled d...
Today’s Internet is open and anonymous. While it permits free traffic from any host, attackers that generate malicious traffic cannot typically be held accountable. In this pa...
Parallel and distributed programming is conceptually harder to undertake and to understand than sequential programming, because a programmer often has to manage the coexistence an...
Employees depend on other people in the enterprise for rapid access to important information. But current systems for finding experts do not adequately address the social implicat...
Kate Ehrlich, Ching-Yung Lin, Vicky Griffiths-Fish...
We present a software tool and a framework for security protocol change management. While we focus on trust negotiation protocols in this paper, many of the ideas are generally ap...