Abstract. A blind signature scheme is a protocol for obtaining a signature from a signer such that the signer's view of the protocol cannot be linked to the resulting message-...
Firewalls provide very good network security features. However, classical perimeter firewall deployments suffer from limitations due to complex network topologies and the inabilit...
The defining characteristic of the Internet today is an abundance of information and choice. Recommender Systems (RS), designed to alleviate this problem, have so far not been ver...
Philip Bonhard, Martina Angela Sasse, Clare Harrie...
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals t...
: Virtual worlds have become very popular recently, in particular 3D virtual worlds with a built-in virtual currency that enables providers and users to monetize their creations. V...