- This paper proposes a "mechanism-based PKI", in which only a mechanism for generating user's private keys is installed on a smart card. The private key is generate...
Researches that have recently investigated the impact of developments in Information Technologies (IT) on human capital in the banking industry analysed only marginally the evolut...
Geographic information systems use databases to map keywords to places. These databases are currently most often created by using a top-down approach based on the geographic defini...
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
Contemporary long-term storage devices feature powerful embedded processors and sizeable memory buffers. Active Storage Devices (ASD) is the hard disk technology that makes use of ...