Abstract. This survey paper studies recent advances in the field of LeakageResilient Cryptography. This booming area is concerned with the design of cryptographic primitives resist...
Many data objects in the real world have attributes about location and time. Such spatiotemporal objects can be found in applications such Geographic Information Systems (GIS), env...
There are today several methods and standards available for assessment of the level of information security in an enterprise. A problem with these assessment methods is that they ...
Rapid business changes require companies to make rapid changes in business processes and ultimately in BPS systems. These changes can be done rapidly if business modelers understan...
Pavel Balabko, Alain Wegmann, Alain Ruppen, Nicola...
Facilitation is a key success factor for effective Group Support Systems (GSS) applications. The development of effective support for facilitation becomes more critical than ever ...