In the past few years, cryptographic key management APIs has been shown to be subject to tricky attacks based on the improper use of cryptographic keys. In fact, real APIs provide mechanisms to declare the intended use of keys but they are not strong enough to provide key security. In ...Download Now
In this paper the authors are interested in framing the uses of signals by business suppliers, and in assessing how signals of supplier's value potential influence supplier selection. Recent research suggests that suppliers increasingly move their communication content from the products they sell to the strategic assets they own. This ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?