Sciweavers

414 search results - page 2 / 83
» Secure Border Control Processes
Sort
View
61
Voted
DGO
2004
108views Education» more  DGO 2004»
15 years 1 months ago
Agency Interoperation for Effective Data Mining in Border Control and Homeland Security Applications
Nabil R. Adam, Vijayalakshmi Atluri, Vandana Pursn...
77
Voted
CORR
2008
Springer
135views Education» more  CORR 2008»
14 years 11 months ago
Crossing Borders: Security and Privacy Issues of the European e-Passport
The first generation of European e-passports will be issued in 2006. We discuss how borders are crossed regarding the security and privacy erosion of the proposed schemes, and show...
Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs,...
CMS
2003
171views Communications» more  CMS 2003»
15 years 1 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
84
Voted
SENSYS
2009
ACM
15 years 6 months ago
A wireless sensor network for border surveillance
We will demonstrate a wireless sensor network system for the surveillance of critical areas and properties – e.g. borders. The system consists of up to 10 sensor nodes that moni...
Denise Dudek, Christian Haas, Andreas Kuntz, Marti...
ISSA
2004
15 years 1 months ago
A Logic-Based Access Control Approach For Web Services
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Marijke Coetzee