We provide new constructions of Leakage-Resilient IdentityBased Encryption systems (IBE) in the Standard model. We apply a hash proof technique in the existing IBE schemes of Bone...
Sherman S. M. Chow, Yevgeniy Dodis, Yannis Rousela...
This paper discusses hypermedia aspects of the design of a Virtual Project Room. Based on ethnographic and participatory design studies of landscape architects’ and architects...
We consider the problem of removing a given disk from a collection of unit disks in the plane. At each step, we allow a disk to be removed by a collision-free translation to infin...
The initial steps in carrying out a feasibility analysis for a web project, based on information obtained interactively from a prospective client, are modelled as a rulebased expe...
Many software projects fail because they overlook stakeholders or involve the wrong representatives of significant groups. Unfortunately, existing methods in stakeholder analysis...
Soo Ling Lim, Daniele Quercia, Anthony Finkelstein