Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
Software for encrypting email messages has been widely available for more than 15 years, but the emailusing public has failed to adopt secure messaging. This failure can be explai...
Abstract—Despite a long standing need to incorporate human factors into security risk analysis, taking a balanced approach to analysing security and usability concerns remains a ...
There has been increasing pressure on the health care sector to adopt information technologies to rationalize service delivery and increase service quality. Medical information sy...
Many video conferencing solutions exist in the market today and many new ones are being introduced. In striving to provide an experience to users as close to “being there” as p...