This paper describes the initial results of a qualitative field study of the work required to review and approve the content on government agency web sites. The study analyzes con...
In this paper we describe new secure personalization schemes using proxy cryptography. We first introduce the context of a large scale smart card application such as an electronic ...
A large proportion of the massive amounts of data that are being collected by many organisations today is about people, and often contains identifying information like names, addre...
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
In recent years, technological developments have made it possible to build interactive 3D models of objects and 3D Virtual Environments that can be experienced through the Web, usi...