As the ubiquitous society spreads rapidly, various private information circulates in large quantities. Information increases explosively in recent years, the importance of privacy ...
Abstract— Privacy and security are two important but seemingly contradict objectives in pervasive computing environments (PCEs). On the one hand, service providers want to authen...
Many authorities have started to use web sites to provide services based on transactions. The guiding vision is often a process portal for citizens that provides access to the cou...
In this paper the authors present the results of a research project that strives to fill a literature gap in IT offshore outsourcing research by analyzing clientside managerial me...
In order to achieve a high performance in a real implementation of the non-repudiation service it is necessary to estimate timeouts, TTP features, publication key time, number of o...