Sciweavers

50 search results - page 8 / 10
» Secure Ownership and Ownership Transfer in RFID Systems
Sort
View
94
Voted
HICSS
2007
IEEE
156views Biometrics» more  HICSS 2007»
15 years 6 months ago
Bridging Business Value Models and Process Models in Aviation Value Webs via Possession Rights
While exploring value webs -cooperating enterprises- it is common to view such webs from multiple perspectives: (1) the business value perspective, (2) the business process perspe...
Vincent Pijpers, Jaap Gordijn
82
Voted
CCS
2003
ACM
15 years 5 months ago
Origin authentication in interdomain routing
Attacks against Internet routing are increasing in number and severity. Contributing greatly to these attacks is the absence of origin authentication: there is no way to validate ...
William Aiello, John Ioannidis, Patrick Drew McDan...
199
Voted
OOPSLA
2009
Springer
15 years 7 months ago
Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations
An object diagram makes explicit the object structures that are only implicit in a class diagram. An object diagram may be missing and must extracted from the code. Alternatively,...
Marwan Abi-Antoun, Jonathan Aldrich
128
Voted
IEEEARES
2010
IEEE
14 years 10 months ago
Using Smart Cards for Tamper-Proof Timestamps on Untrusted Clients
Online auctions of governmental bonds and CO2 certificates are challenged by high availability requirements in face of high peak loads around the auction deadline. Traditionally, t...
Guenther Starnberger, Lorenz Froihofer, Karl M. G&...
106
Voted
APCCAS
2002
IEEE
156views Hardware» more  APCCAS 2002»
15 years 5 months ago
Bit-plane watermarking for zerotree-coded images
In this paper, we develop a robust bit-plane watermarking technique based on zerotree coding. A robust watermark is an imperceptible but indelible code that can be used for owners...
Shih-Hsuan Yang, Hsin-Chang Chen