Sciweavers

5665 search results - page 194 / 1133
» Introduction to Computer Security
Sort
View
128
Voted
ESORICS
2012
Springer
13 years 3 months ago
Dismantling iClass and iClass Elite
With more than 300 million cards sold, HID iClass is one of the most popular contactless smart cards on the market. It is widely used for access control, secure login and payment s...
Flavio D. Garcia, Gerhard de Koning Gans, Roel Ver...
88
Voted
DAC
1998
ACM
16 years 1 months ago
Data Security for Web-based CAD
Scott Hauck, Stephen Knol
93
Voted
WISEC
2010
ACM
15 years 7 months ago
On the efficiency of secure beaconing in VANETs
Elmar Schoch, Frank Kargl
69
Voted
ICCS
2007
Springer
15 years 6 months ago
Energy Efficient Forwarding Scheme for Secure Wireless Ad Hoc Routing Protocols
Kwonseung Shin, Min Young Chung, Hyunseung Choo
83
Voted
ICSOC
2007
Springer
15 years 6 months ago
Goal-Equivalent Secure Business Process Re-engineering
Hugo A. López, Fabio Massacci, Nicola Zanno...