— We present an architecture for the provision of network layer privacy based on the SHIM6 multihoming protocol. In its basic form, the architecture prevents on-path eavesdropper...
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is pro...
Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mat...
This paper introduces the concept of the “vendible line” partitioning jobs in a company into those that are likely to be lost to outsourcing (onshore or offshore) and those th...
Organizations subsist on communication and coordination. An organization’s ability to remember and learn from its past, in other words, its ability to use its “organizational ...