publié le: 2020
As online sources are becoming more prevalent in journalism and scientific literature, the ephemeral nature of the World Wide Web is becoming an incre...
Trust in Secure Sockets Layer-based communications is traditionally provided by Certificate (or Certification) Authorities (CAs) in the form of signed...
Traditional venue and tour recommendation systems do not necessarily provide a diverse set of recommendations and leave little room for serendipity. I...
Mobile Edge Computing (MEC) is a promising network architecture that pushes network control and mobile computing to the network edge. Recent studies p...
Recent advances in cryptographic approaches, such as Functional Encryption and Attribute-based Encryption and their variants, have shown significant p...