In this paper, we present the first certificateless undeniable signature scheme. The scheme does not suffer from the key escrow problem, which is inherent in identity based crypto...
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
The design and development of complex products invariably involves many actors who have different points of view on the problem they are addressing, the product being developed, a...
A contemporary approach to describing and theorizing about joint human endeavor is to posit `knowledge in common' as a basis for awareness and coordination. Recent analysis h...
John M. Carroll, Mary Beth Rosson, Gregorio Conver...
: Web applications have evolved from simple read-only websites to complex data- and operation-intensive systems. The main goal of this kind of application is to provide the users w...