- This paper analyzes the secure protocols in the digital transmission copy protection (DTCP) specification. The full authentication protocol in the specification is a combination ...
Software for encrypting email messages has been widely available for more than 15 years, but the emailusing public has failed to adopt secure messaging. This failure can be explai...
We implement a specific protocol for bit exchange among card-playing agents in three different state-of-the-art epistemic model checkers and compare the results. Key words: Crypto...
Hans P. van Ditmarsch, Wiebe van der Hoek, Ron van...
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
: The paper investigates first the role of artifacts in a cooperative work environment. It shows the different types of artifacts used in work groups. Then, it stresses the charact...