The rights of an Internet user acting anonymously conflicts with the rights of a Server victim identifying the malicious user. The ERPINA protocol, introduced in this paper, allow...
Giannakis Antoniou, Leon Sterling, Stefanos Gritza...
Abstract. The increased availability and robustness of sensors, the wide-spread use of the internet as a communication environment and the intensified adoption of semantic technolo...
A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages o...
This paper shows a user-oriented presence synthesizing system, where a user can control not only what she publishes to each buddy but what she sees by synthesizing her buddies’ ...
This paper presents the design and the implementation of a platform allowing owners of mobile devices to exchange software application programs using a peer-to-peer scheme in hybr...