Sciweavers

1045 search results - page 43 / 209
» On the Security of Digital Tachographs
Sort
View
CORR
2010
Springer
168views Education» more  CORR 2010»
14 years 12 months ago
Mobile Based Secure Digital Wallet for Peer to Peer Payment System
Majid Taghiloo, Mohammad Ali Agheli, Mohammad Reza...
IEEESP
2006
51views more  IEEESP 2006»
14 years 11 months ago
Digital Rights Management, Spyware, and Security
Edward W. Felten, J. Alex Halderman
DAC
2009
ACM
14 years 9 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
CCS
2009
ACM
15 years 4 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
IEEEARES
2008
IEEE
15 years 6 months ago
Static Validation of Licence Conformance Policies
Policy conformance is a security property gaining importance due to commercial interest like Digital Rights Management. It is well known that static analysis can be used to valida...
René Rydhof Hansen, Flemming Nielson, Hanne...