Sciweavers

506 search results - page 41 / 102
» Electronic-internet business and security
Sort
View
82
Voted
ICMB
2005
IEEE
73views Business» more  ICMB 2005»
15 years 7 months ago
MMPS: A Versatile Mobile-to-Mobile Payment System
The paper presents an effective mobile-to-mobile payment system. A mobile phone with or without SIM card is enabled as an EMV payment instrument and is linked to a debit or credit...
Ashutosh Saxena, Manik Lal Das, Anurag Gupta
AGENTS
1999
Springer
15 years 6 months ago
A Methodology for Agent-Oriented Analysis and Design
This paper presents a methodology for agent-oriented analysis and design. The methodology is general, in that it is applicable to a wide range of multi-agent systems, and comprehe...
Michael Wooldridge, Nicholas R. Jennings, David Ki...
CSREAEEE
2006
149views Business» more  CSREAEEE 2006»
15 years 3 months ago
ALE Application Framework for Constructing Effective RFID Application
- RFID technology could greatly improve the business efficiency. EPCglobal Network suggests a kind of interface, called ALE (Application Level Events), for an efficient RFID develo...
Kyuhee An, Mokdong Chung
JNW
2008
83views more  JNW 2008»
15 years 1 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...
139
Voted
SACMAT
2010
ACM
15 years 6 months ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller