Sciweavers

2904 search results - page 189 / 581
» Internet Infrastructure Security
Sort
View
PAKM
2004
15 years 5 months ago
XAROP: A Midterm Report in Introducing a Decentralized Semantics-Based Knowledge Sharing Application
Abstract. Knowledge management solutions relying on central repositories sometimes have not met expectations, since users often create knowledge ad-hoc using their individual vocab...
Christoph Tempich, Marc Ehrig, Christiaan Fluit, P...
AINA
2007
IEEE
15 years 7 months ago
pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices
PKI is generally considered as the most appropriate solution for e-commerce and mutual authentication, owing to its digital signature and non-repudiation features. Asymmetric key ...
Ki-Woong Park, Hyunchul Seok, Kyu Ho Park
CORR
2006
Springer
97views Education» more  CORR 2006»
15 years 3 months ago
Trusted Computing in Mobile Action
Due to the convergence of various mobile access technologies like UMTS, WLAN, and WiMax the need for a new supporting infrastructure arises. This infrastructure should be able to ...
Nicolai Kuntze, Andreas U. Schmidt
IJCIS
1998
107views more  IJCIS 1998»
15 years 3 months ago
Supporting Electronic Commerce Transactions with Contracting Services
Abstracting from basic communication mechanisms such as transactionally secure remote procedure calls and remote database access mechanisms, this includes service trading and bro...
Michael Merz, Frank Griffel, M. Tuan Tu, Stefan M&...
75
Voted
WWW
2006
ACM
16 years 4 months ago
Safeguard against unicode attacks: generation and applications of UC-simlist
A severe potential security problem in utilization of Unicode in the Web is identified, which is resulted from the fact that there are many similar characters in the Unicode Chara...
Anthony Y. Fu, Wan Zhang, Xiaotie Deng, Liu Wenyin