Safeguarding online communications using public key cryptography is a well-established practice today, but with the increasing reliance on "Faceless", solely online entities one of the core aspects of public key cryptography is becoming a substantial problem in practice: who can trust the authors to introduce one to and vouch for ...Download Now
IT Governance methods and frameworks have been applied in most large for-profit organizations since these enterprises realize the benefits of IT Governance for their business. However, former research and the authors' own surveys show that frameworks such as ITIL and COBIT are not very well established in Small and Medium ...Download Now
In this paper, the authors provide complete end-to-end delay analyses including the relay nodes for instant messages. Message Session Relay Protocol (MSRP) is used to provide congestion control for large messages in the Instant Messaging (IM) service. Large messages are broken into several chunks. These chunks may traverse through a ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?