This paper initiates a study of accountable certificate management methods, necessary to support long-term authenticity of digital documents. Our main contribution is a model for ...
For the two last decades, electronic authentication has been an important topic. The first applications were digital signatures to mimic handwritten signatures for digital document...
Many authors in the field of 3D human computer interaction have described the advantages of 3D user interfaces: Intuitive metaphors from daily life, immersive workspaces, virtual ...
Recent study has shown that canonical algorithms such as Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) can be obtained from graph based dimensionality ...
The goal of IT governance is not only to achieve internal efficiency in an IT organization, but also to support IT's role as a business enabler. The latter is here denoted IT...