Sciweavers

2363 search results - page 135 / 473
» How Secure is RFID
Sort
View
WWW
2009
ACM
16 years 5 months ago
Securely implementing open geospatial consortium web service interface standards in oracle spatial
In this paper, we briefly describe the implementation of various Open Geospatial Consortium Web Service Interface Standards in Oracle Spatial 11g. We highlight how we utilize Orac...
Ning An, Raja Chatterjee, Mike Hörhammer, Siv...
115
Voted
TCC
2010
Springer
236views Cryptology» more  TCC 2010»
16 years 1 months ago
From Passive to Covert Security at Low Cost
Aumann and Lindell defined security against covert attacks, where the adversary is malicious, but is only caught cheating with a certain probability, where the idea is that in man...
Ivan Damgård, Martin Geisler, Jesper Buus Ni...
138
Voted
P2P
2005
IEEE
106views Communications» more  P2P 2005»
15 years 10 months ago
Trusted Computing: Providing Security for Peer-to-Peer Networks
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security servi...
Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson
143
Voted
ECWEB
2003
Springer
93views ECommerce» more  ECWEB 2003»
15 years 10 months ago
A Secure Electronic Payment Scheme for Charity Donations
Although many charities have a web presence, almost all of them have been designed to accept credit cards as the only means for making donations. The anonymity requirements of many...
Mansour A. Al-Meaither, Chris J. Mitchell
ICDCS
1997
IEEE
15 years 9 months ago
Secure Reliable Multicast Protocols in a WAN
A secure reliable multicast protocol enables a process to send a message to a group of recipients such that all correct destinations receive the same message, despite the maliciou...
Dahlia Malkhi, Michael Merritt, Ohad Rodeh