Sciweavers

5119 search results - page 178 / 1024
» Security Privacy
Sort
View
ACSAC
2001
IEEE
15 years 7 months ago
The Performance Measurement of Cryptographic Primitives on Palm Devices
We developed and evaluated several cryptographic system libraries for Palm OS
Duncan S. Wong, Hector Ho Fuentes, Agnes Hui Chan
OOPSLA
1995
Springer
15 years 7 months ago
Problem-Oriented Object Memory: Customizing Consistency
Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Internal Acc...
Anders Kristensen, Colin Low
118
Voted
CCS
2008
ACM
15 years 6 months ago
Verified implementations of the information card federated identity-management protocol
We describe reference implementations for selected configurations of the user authentication protocol defined by the Information Card
Karthikeyan Bhargavan, Cédric Fournet, Andr...
SP
2002
IEEE
143views Security Privacy» more  SP 2002»
15 years 3 months ago
Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards
In this paper, we introduce a new class of side
Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, S...
GIL
2010
15 years 2 months ago
Agribusiness 2.0
Abstract: Die Anwendung von Web 2.0 Tools innerhalb von Unternehmen erm
Jurek Hille