Sciweavers

45 search results - page 2 / 9
» Integrating Security Patterns into the Electronic Invoicing ...
Sort
View
EUROPKI
2005
Springer
13 years 10 months ago
Legal Security for Transformations of Signed Documents: Fundamental Concepts
Abstract. Transformations of signed documents raise questions of technical and organisational nature which render the legal security of the transformed document doubtful. In partic...
Andreas U. Schmidt, Zbynek Loebl
SAFECOMP
2005
Springer
13 years 10 months ago
Problem Frames and Architectures for Security Problems
Abstract. We present several problem frames that serve to structure, characterize and analyze software development problems in the area of software and system security. These probl...
Denis Hatebur, Maritta Heisel
CCS
2011
ACM
12 years 5 months ago
Televisions, video privacy, and powerline electromagnetic interference
We conduct an extensive study of information leakage over the powerline infrastructure from eight televisions (TVs) spanning multiple makes, models, and underlying technologies. I...
Miro Enev, Sidhant Gupta, Tadayoshi Kohno, Shwetak...
EEE
2004
IEEE
13 years 9 months ago
Mining Traveling and Purchasing Behaviors of Customers in Electronic Commerce Environment
Web usage mining is the process of extracting interesting patterns from web logs. This paper proposes an IPA (Integrating Path traversal patterns and Association rules) model for ...
Yue-Shi Lee, Show-Jane Yen, Ghi-Hua Tu, Min-Chi Hs...
SAFECOMP
2000
Springer
13 years 8 months ago
Expert Error: The Case of Trouble-Shooting in Electronics
An expert trouble-shooter is a subject who has a great deal of experience in his activity that allows him or her to be very efficient. However, the large amount of problems he or s...
Denis Besnard