The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect th...
Nowadays, almost all public administration plan to establish processes with electronic signatures. For such processes, there are no standardized system models with test cases. We a...
B. Lapken, Frank Losemann, Thomas Engel, Christoph...
Large scale systems such as the Grid need scalable and efficient resource allocation mechanisms to fulfil the requirements of its participants and applications while the whole s...
ABSTRACT. Reasoning with diagrams: cognitive and computational perspectives. Diagrammatic, analogical or iconic representations are often contrasted with linguistic or logical repr...
A well-known problem in P2P systems is freeriding, where users do not share content if there is no incentive to do so. In this paper, we distinguish lazy freeriders that are merel...
Michel Meulpolder, Johan A. Pouwelse, Dick H. J. E...