Sciweavers

1353 search results - page 94 / 271
» Securing Current and Future Process Control Systems
Sort
View
108
Voted
SOUPS
2010
ACM
15 years 7 months ago
Usably secure, low-cost authentication for mobile banking
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
Saurabh Panjwani, Edward Cutrell
107
Voted
JDCTA
2010
172views more  JDCTA 2010»
14 years 10 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
DEXAW
1997
IEEE
99views Database» more  DEXAW 1997»
15 years 7 months ago
A Framework for Dynamic Changes in Workflow Management Systems
Current workflow management systems (WFMSs) are only applicable in a reliable and secure manner, if the business process (BP) to be supported is wellstructured. As ad hoc deviatio...
Manfred Reichert, Peter Dadam
110
Voted
CHES
2005
Springer
111views Cryptology» more  CHES 2005»
15 years 9 months ago
Security Limits for Compromising Emanations
Nearly half a century ago, military organizations introduced “Tempest” emission-security test standards to control information leakage from unintentional electromagnetic emanat...
Markus G. Kuhn
USS
2008
15 years 5 months ago
NetAuth: Supporting User-Based Network Services
In User-Based Network Services (UBNS), the process servicing requests from user U runs under U's ID. This enables (operating system) access controls to tailor service authori...
Manigandan Radhakrishnan, Jon A. Solworth