A proxy signature protocol allows an original signer to delegate its signing power to another entity, called proxy signer, to sign messages on its behalf. The dele-gated proxy signer can compute a proxy signature that can be verified by anyone with access to the original signer's public key. Proxy signatures ...Download Now
Key authentication is very important in secret communications and data security. Recently, Lee, Hwang and Li proposed a new public key authentication scheme for cryptosystems with a trusty server. However, in this paper, the authors will show that Lee-Hwang-Li's key authentication scheme is not secure, from the obtained public information, ...Download Now
Information Technology (IT) outsourcing has been one of the critical issues in organization management. Business Process Outsourcing (BPO) is an advanced type of IT outsourcing, which will be the next big wave in information technology services. Nevertheless, since prior studies have only examined issues related to traditional IS outsourcing, there ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?