Sciweavers

1627 search results - page 17 / 326
» High Security Smartcards
Sort
View
CHES
2011
Springer
250views Cryptology» more  CHES 2011»
13 years 11 months ago
High-Speed High-Security Signatures
Daniel J. Bernstein, Niels Duif, Tanja Lange, Pete...
CRYPTO
2000
Springer
136views Cryptology» more  CRYPTO 2000»
15 years 4 months ago
Long-Lived Broadcast Encryption
In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually he...
Juan A. Garay, Jessica Staddon, Avishai Wool
USENIX
1994
15 years 1 months ago
Key Management in an Encrypting File System
As distributed computing systems grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes i...
Matt Blaze
BDIM
2007
IEEE
115views Business» more  BDIM 2007»
14 years 12 months ago
Specifying Information Security Needs for the Delivery of High Quality Security Services
In this paper we present an approach for specifying respect to security. When an organization wants to secure and prioritizing information security requirements in organiza- its sy...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck
MOBISYS
2007
ACM
15 years 11 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti