Sciweavers

IEEESP
2006
52views more  IEEESP 2006»
13 years 4 months ago
Lessons for laptops from the 18th century
Roland L. Trope, E. Michael Power
IEEESP
2006
130views more  IEEESP 2006»
13 years 4 months ago
Securing Embedded Systems
t a single security abstraction layer, but rather is a roblem spanning multiple abstraction levels. We use an embedded biometric authentication device to demonstratethenecessityofa...
David Hwang, Patrick Schaumont, Kris Tiri, Ingrid ...
IEEESP
2006
62views more  IEEESP 2006»
13 years 4 months ago
Case Study: Online Banking Security
Kjell Jørgen Hole, Vebjørn Moen, Tho...
IEEESP
2006
68views more  IEEESP 2006»
13 years 4 months ago
Secure Internet Banking Authentication
Alain P. Hiltgen, Thorsten Kramp, Thomas Weigold
IEEESP
2006
47views more  IEEESP 2006»
13 years 4 months ago
Randomness in Cryptography
Rosario Gennaro
IEEESP
2006
72views more  IEEESP 2006»
13 years 4 months ago
Challenges in Securing the Domain Name System
Ramaswamy Chandramouli, Scott Rose
IEEESP
2006
66views more  IEEESP 2006»
13 years 4 months ago
The End of End-to-End Security?
Scott Bradner