Sciweavers

CSREASAM
2006
13 years 6 months ago
Optical Wireless: Chromatic Encoded Visual Data Transfer
- This paper explains a new technique that takes advantage of advancements in digital imaging technology to visually transfer large amounts of data quickly between computing machin...
Arthur Reloj, Gregory Vert
CSREASAM
2006
13 years 6 months ago
A Visual Environment for Characterization of State Changes in Computer Systems
: Traditional state modeling techniques have several limitations. One of these is the reduced ability to model a large number of variables simultaneously. Another limitation is tha...
Gregory Vert, Sergiu M. Dascalu, Frederick C. Harr...
CSREASAM
2006
13 years 6 months ago
An Enhanced Pretty Good Privacy (EPGP) System with Mutual Non-Repudiation
Enhanced Pretty Good Privacy (EPGP) is a new cryptosystem based on Pretty Good Privacy (PGP), used for the purpose of secure e-mail message communication over an open network. The...
Gregory Vert, Manaf Alfize
CSREASAM
2006
13 years 6 months ago
Secure E-commerce Protection Profile
We present a Secure E-commerce Protection Profile (SEPP) that captures security requirements for securing sessions in the e-commerce operational environment. The SEPP is prepared ...
Anil Kumar Venkataiahgari, Mourad Debbabi, J. Will...
CSREASAM
2006
13 years 6 months ago
SQL Injection - Threats to Medical Systems: The Issues and Countermeasures
- A vast majority of medical information systems use Standard Query Language databases (SQL) as the underlying technology to deliver medical records in a timely and efficient manne...
Craig Valli
CSREASAM
2006
13 years 6 months ago
A Proposal of One-Time Biometric Authentication
- In biometric authentication, feature information of each enrolled person's biometric information is enrolled as templates. Secure databases or anti-tampered devices store th...
Yoshifumi Ueshige, Kouichi Sakurai
CSREASAM
2006
13 years 6 months ago
Security Analysis of the Digital Transmission Copy Protection Specification
- This paper analyzes the secure protocols in the digital transmission copy protection (DTCP) specification. The full authentication protocol in the specification is a combination ...
Haibo Tian, Yumin Wang
CSREASAM
2006
13 years 6 months ago
Trusted Storage: Focus on Use Cases
This paper describes use cases for the application of Trusted Computing Group (TCG) techniques and specifications to storage devices. The use cases fall into three broad categorie...
Robert Thibadeau, Michael Willett