The objective of this paper is to propose a cryptographic protocol which provides authenticity in the exchange of information between two entities without using any shared secret ...
Database outsourcing is an important emerging trend which involves data owners delegating their data management needs to an external service provider. Since a service provider is a...
Information technologies and society are highly interwoven nowadays, but in both, the private and business sector, users are often not aware of security issues or lack proper secu...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...
The integration of supply chains as a mechanism for value creation is largely dependent on continuous flow of real time accurate information from the customer back upstream to the...
We analyse the convergence of a GA when the mutation probability is low and the selection pressure is high, for arbitrary crossover types and probabilities. We succeed in mathemat...