Sciweavers

1605 search results - page 63 / 321
» E-commerce Security Issues
Sort
View
CCS
2008
ACM
14 years 11 months ago
Robust, anonymous RFID authentication with constant key-lookup
A considerable number of anonymous RFID authentication schemes have been proposed. However, current proposals either do not provide robust security guarantees, or suffer from scal...
Mike Burmester, Breno de Medeiros, Rossana Motta
CARDIS
2000
Springer
91views Hardware» more  CARDIS 2000»
15 years 2 months ago
Making Sense of Smart Card Security Certifications
Manufacturers and producers of smart card systems are all beginning to climb on the certification bandwagon. In this paper, we analyse the current state of smart card certificati...
Jason Reid, Mark Looi
TDSC
2011
14 years 4 months ago
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
—In this paper, we study leader election in the presence of selfish nodes for intrusion detection in mobile ad hoc networks (MANETs). To balance the resource consumption among a...
Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad De...
ICC
2009
IEEE
139views Communications» more  ICC 2009»
15 years 4 months ago
FRAME: An Innovative Incentive Scheme in Vehicular Networks
—Vehicular ad hoc networks (VANETs) are envisioned to provide promising applications and services. One critical deployment issue in VANETs is to motivate vehicles and their drive...
Feng Li, Jie Wu
CSFW
2003
IEEE
15 years 3 months ago
On Generalized Authorization Problems
This paper defines a framework in which one can formalize a variety of authorization and policy issues that arise in access control of shared computing resources. Instantiations ...
Stefan Schwoon, Somesh Jha, Thomas W. Reps, Stuart...