Sciweavers

383 search results - page 28 / 77
» Knowledge Integration as a Key Problem in an ERP Implementat...
Sort
View
WISTP
2010
Springer
14 years 11 months ago
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
Michael Braun, Ulrike Meyer, Susanne Wetzel
WISA
2004
Springer
15 years 7 months ago
Encrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
Markku-Juhani Olavi Saarinen
CIMCA
2006
IEEE
15 years 8 months ago
A Knowledge-based Security Policy Framework for Business Process Management
Business Process Management (BPM) is often a key component of the business change. Business rules, whether embedded within BPM or on their own, have begun playing an ever-increasi...
Dong Huang, Yi Yang, Jacques Calmet
INTEGRATION
2007
100views more  INTEGRATION 2007»
15 years 1 months ago
A fast pipelined multi-mode DES architecture operating in IP representation
The Data Encryption Standard (DES) is a cipher that is still used in a broad range of applications, from smartcards, where it is often implemented as a tamperresistant embedded co...
Sylvain Guilley, Philippe Hoogvorst, Renaud Pacale...
CIB
2004
83views more  CIB 2004»
15 years 1 months ago
Web-Based Semantic Pervasive Computing Services
Abstract-- Pervasive Computing refers to a seamless and invisible computing environment which provides dynamic, proactive and context-aware services to the user by acquiring contex...
Yugyung Lee, Soon Ae Chun, James Geller