Sciweavers

1605 search results - page 95 / 321
» E-commerce Security Issues
Sort
View
CARDIS
2000
Springer
110views Hardware» more  CARDIS 2000»
15 years 2 months ago
Biometrics, Access Control, Smart Cards: A not so Simple Combination
Although biometrics can be an useful component for access control, the security they procure is often overestimated, as if they were a magic tool whose simple use will automatical...
Gaël Hachez, François Koeune, Jean-Jac...
ACSAC
1999
IEEE
15 years 2 months ago
A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
Rolf Oppliger, Andreas Greulich, Peter Trachsel
ISCI
2008
160views more  ISCI 2008»
14 years 10 months ago
Certificateless undeniable signature scheme
In this paper, we present the first certificateless undeniable signature scheme. The scheme does not suffer from the key escrow problem, which is inherent in identity based crypto...
Shanshan Duan
NOMS
2006
IEEE
15 years 3 months ago
UNIQuE: A User-Centric Framework for Network Identity Management
—Network identity management system, in theory, is conceived as the solution to many identity-related issues burgeoning day-to-day. These issues, which need to be addressed, rang...
Jörn Altmann, Rajarajan Sampath
ESORICS
2002
Springer
15 years 9 months ago
Outbound Authentication for Programmable Secure Coprocessors
A programmable secure coprocessor platform can help solve many security problems in distributed computing. However, these solutions usually require that coprocessor applications be...
Sean W. Smith