Sciweavers

2363 search results - page 137 / 473
» How Secure is RFID
Sort
View
CMS
2003
101views Communications» more  CMS 2003»
15 years 6 months ago
Watermark Security via Secret Wavelet Packet Subband Structures
Abstract. Wavelet packet decompositions generalize the classical pyramidal wavelet structure. We use the vast amount of possible wavelet packet decomposition structures to create a...
Werner Dietl, Andreas Uhl
143
Voted
MMNS
2003
113views Multimedia» more  MMNS 2003»
15 years 6 months ago
Secure Inclusion of Phones Into Online E-meetings
Online Internet based e-meetings for synchronous communication is becoming more and more common and the need for secure communication is a strong requirement from both corporate a...
Peter Parnes
ENTCS
2007
87views more  ENTCS 2007»
15 years 5 months ago
Temporal Logics of Knowledge and their Applications in Security
Temporal logics of knowledge are useful for reasoning about situations where the knowledge of an agent or component is important, and where change in this knowledge may occur over...
Clare Dixon, M. Carmen Fernández Gago, Mich...
JCS
2007
141views more  JCS 2007»
15 years 4 months ago
Compositional information flow security for concurrent programs
We present a general unwinding framework for the definition of information flow security properties of concurrent programs, described in a simple imperative language enriched wi...
Annalisa Bossi, Carla Piazza, Sabina Rossi
BIRTHDAY
2010
Springer
15 years 4 months ago
Specifying and Verifying Organizational Security Properties in First-Order Logic
In certain critical cases the data flow between business departments in banking organizations has to respect security policies known as Chinese Wall or Bell–La Padula. We show t...
Christoph Brandt, Jens Otten, Christoph Kreitz, Wo...