The holy grail of a mathematical model of secure encryption is to devise a model that is both faithful in its description of the real world, and yet admits a construction for an en...
A conceptual business model using the electronic media for world commerce in the semiconductor industry is presented. The proposed model has a great potential to meet online custo...
Early information systems were mainly built around secondary, administrative processes of the value chain (e.g. accounting). But since the internet came into use, more and more pr...
We obtain analytically the delay per packet in a burst for the three burst aggregation algorithms: Time based, Burst Length based and mixed Time and Burst Length based, assuming r...
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...