Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
The Jiro™ technology provides an environment intended for the implementation of storage management solutions. A product based on Jiro technology is an implementation based on th...
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
As multimedia becomes an integral part of collaborative systems, we must understand how to design such systems to support users’ rich set of existing interaction skills, rather ...
Legal-RDF.org1 publishes a practical ontology that models both the layout and content of a document and metadata about the document; these have been built using data models implici...