Sciweavers

3451 search results - page 173 / 691
» Security of Backup Data
Sort
View
PET
2004
Springer
15 years 10 months ago
Secure Outsourcing of Sequence Comparisons
Internet computing technologies, like grid computing, enable a weak computational device connected to such a grid to be less limited by its inadequate local computational, storage,...
Mikhail J. Atallah, Jiangtao Li
134
Voted
ACMICEC
2003
ACM
113views ECommerce» more  ACMICEC 2003»
15 years 10 months ago
PayCash: a secure efficient Internet payment system
This paper describes PayCash, an Internet payment system that was designed to offer strong security and privacy protection. This system is based on the concept of electronic cash,...
Jon M. Peha, Ildar M. Khamitov
ACMICEC
2008
ACM
253views ECommerce» more  ACMICEC 2008»
15 years 6 months ago
Secure and efficient protocol for mobile payments
Electronic Payments have gained tremendous popularity in the modern world. Credit/debit cards and online payments are in widespread use. Bringing electronic payments to the mobile...
Rahul M. Godbole, Alwyn R. Pais
222
Voted
CSFW
2011
IEEE
14 years 4 months ago
Dynamic Enforcement of Knowledge-Based Security Policies
—This paper explores the idea of knowledge-based security policies, which are used to decide whether to answer queries over secret data based on an estimation of the querier’s ...
Piotr Mardziel, Stephen Magill, Michael Hicks, Mud...
HICSS
2006
IEEE
75views Biometrics» more  HICSS 2006»
15 years 10 months ago
Computer Security Risks in the Internet Era: Are Small Business Owners Aware and Proactive?
This article empirically examines the awareness, concern, and actions of home-based small business owners regarding Internet-based computer security risks. A scientific, Internet-...
David W. Johnson, Harold Koch