Abstract. The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need ass...
In this paper we present an approach for specifying respect to security. When an organization wants to secure and prioritizing information security requirements in organiza- its sy...
While many multimedia systems allow the association of semantic annotations with media assets, there is no agreedupon way of sharing these among systems. As an initial step within...
Lynda Hardman, Zeljko Obrenovic, Frank Nack, Brigi...
The transformation of economic development approach demands to develop high-tech industries, while high-tech industries can't develop without financial support, in which diff...
Background: Transmission electron tomography is an increasingly common three-dimensional electron microscopy approach that can provide new insights into the structure of subcellul...