Abstract Most SSL/TLS-based e-commerce applications employ conventional mechanisms for user authentication. These mechanisms—if decoupled from SSL/TLS session establishment—are...
Rolf Oppliger, Ralf Hauser, David A. Basin, Aldo R...
A prominent trend in the software industry in the late 1990s was the development of the application service providing business model. Application service providers (ASP)1 offer th...
This paper examines the current advantages and limitations of the developing Global Information Infrastructure (GII) for commerce from the point of view of today’s players. It i...
Prior survey of RED algorithm deployment on multiqueue system with shared buffer was unfair and sensitive to congestion level by statically setting the parameters. In this paper, ...
We analyze the results of a survey distributed to heavy users of social networking website on current mobile communications practices regarding location disclosure. We discovered ...