When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can capture a password by direct observation or by record...
Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, Je...
We study properties of solutions to fully nonlinear versions of the standard Black– Scholes partial differential equation. These equations have been introduced in financial mat...
This paper is the product of a workshop held in Amsterdam during the Software Technology and Practice Conference (STEP 2003). The purpose of the paper is to propose Bloom’s taxo...
Pierre Bourque, Luigi Buglione, Alain Abran, Alain...
REMAN is a reputation management infrastructure for composite Web services. It supports the aggregation of client feedback on the perceived QoS of external services, using reputat...
Domenico Bianculli, Walter Binder, Mauro Luigi Dra...
The damage inflicted by viruses and worms has been limited because the payloads that are most lucrative to malware authors have also posed the greatest risks to them. The problem...