This presentation describes a project for a standard undergraduate human-computer interaction (HCI) course that incorporates issues related to users who are disabled. It is part o...
In this paper, we describe the experience of designing a collaborative learning activity for a traditional historical/cultural museum. The activity, based on a “Mystery in the M...
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Abstract. Many algorithmic problems, which are used to prove the security of a cryptographic system, are shown to be characterized as the subgroup membership problem. We then apply...
The problem of key management in access hierarchies studies ways to assign keys to users and classes such that each user, after receiving her secret key(s), is able to independentl...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...