Sciweavers

2386 search results - page 125 / 478
» Database Security 2000
Sort
View
EUC
2007
Springer
15 years 4 months ago
Low-Cost and Strong-Security RFID Authentication Protocol
This paper proposes a low-cost and strong-security RFID protocol to reduce the computational load on both the back-end database and the tags in an RFID system. When desynchronizati...
JaeCheol Ha, Sang-Jae Moon, Juan Manuel Gonz&aacut...
DEXAW
2005
IEEE
116views Database» more  DEXAW 2005»
15 years 3 months ago
Security Analysis of Mobile Java
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, ...
DEXAW
2004
IEEE
98views Database» more  DEXAW 2004»
15 years 1 months ago
MetaData for Efficient, Secure and Extensible Access to Data in a Medical Grid
In this paper we present the metadata usage in a medical imaging project grid. Metadata represent data about the data: In our case, the data are medical images and the metadata sto...
Jean-Marc Pierson, Ludwig Seitz, Hector Duque, Joh...
MMSEC
2005
ACM
113views Multimedia» more  MMSEC 2005»
15 years 3 months ago
A secure biometric authentication scheme based on robust hashing
In this paper, we propose a secure biometric based authentication scheme which fundamentally relies on the use of a robust hash function. The robust hash function is a one-way tra...
Yagiz Sutcu, Husrev T. Sencar, Nasir D. Memon
DEXAW
2006
IEEE
188views Database» more  DEXAW 2006»
15 years 4 months ago
A Protocol for Secure Content Distribution in Pure P2P Networks
A significant challenge for Peer-to-Peer (P2P) systems is maintaining the correctness and consistency of their global data structures and shared contents as peers independently a...
Esther Palomar, Juan M. Estévez-Tapiador, J...