A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
Software development managers strive to control all of the factors that might impact the success of their projects. However, not all of these factors have been identified, much le...
A Private Information Retrieval (PIR) protocol allows a database user, or client, to obtain information from a data- base in a manner that prevents the database from knowing which...
In this work, we propose a new generalization of the notion of group signatures, that allows signers to cover the entire spectrum from complete disclosure to complete anonymity. Pr...
This paper describes results from a large-scale survey to explore users’ comfort with different styles of avatars for workplace communication. Thirty-one avatars were evaluated ...