Within the last year
Within the past 3 years
1 - 10 of 20 articles
Using hardware- and software-based techniques to realize a primitive for externally verifiable code execution.
By applying well-known principlesof intellectual property valuation,sales expectations, growth of maintained software, discounting to present value, and the like, a method is presented for valuingsoftware based on the income that use of the softwareis expected to generate in the future.
Enabling novel ways to personalize the relationship with customers without sacrificing their privacy.
Three Asian economic heavyweights---China, Japan, and South Korea---join IT forces.
Cryptographic long-term security is needed, but difficult to achieve. Use flexible cryptographic tools, and have replacements ready.
Read and print from thousands of top scholarly journals.
Sign up with Facebook
Sign up with Google
Already have an account? Log in
Save this article to read later. You can see your Read Later on your DeepDyve homepage.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.