Secure communication over the Internet becomes an essential requirement for any value-added Internet application. The use of cryptography for secure communication brings out the r...
This paper examines the concept of cyberterrorism. Fringe activity on the Internet ranges from nonviolent `Use' at one end to `Cyberterrorism' at the other. Rejecting th...
The Internet no longer meets the world’s requirements. Recognition of the Internet architecture’s inherent flaws has opened a window of opportunity for fresh thinking: granti...
One often meets the argument that the adoption of mobile Internet services is difficult to understand due to a lack of relevant research. However, much research has already been c...
In this paper we present our vision of the Internet Enterprise: a highly interoperable, virtual enterprise infrastructure for individuals, small businesses, and large corporations...
Abdelsalam Helal, Stanley Y. W. Su, Jie Meng, Raja...