Sciweavers

3451 search results - page 188 / 691
» Security of Backup Data
Sort
View
IJNSEC
2008
88views more  IJNSEC 2008»
15 years 4 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King
WIAS
2010
102views more  WIAS 2010»
15 years 3 months ago
Information security underlying transparent computing: Impacts, visions and challenges
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
Yaoxue Zhang, Laurence Tianruo Yang, Yuezhi Zhou, ...
SP
1998
IEEE
15 years 9 months ago
Stack and Queue Integrity on Hostile Platforms
When computationally intensive tasks have to be carried out on trusted, but limited, platforms such as smart cards, it becomes necessary to compensate for the limited resources me...
Premkumar T. Devanbu, Stuart G. Stubblebine
SOSE
2008
IEEE
15 years 11 months ago
A Gateway Design for Message Passing on the SOA Healthcare Platform
Various security and privacy issues have emerged from the SOA healthcare platform. Large amounts of personal data are transmitted daily through the SOA healthcare platform. For se...
Chi-Lu Yang, Yeim-Kuan Chang, Chih-Ping Chu
ACMSE
2004
ACM
15 years 10 months ago
Implementing the TEA algorithm on sensors
Sensors are tiny computers with limited computational capability and physical resources. The implementation of secure protocols for sensor network is a big challenge. In order to ...
Shuang Liu, Olga V. Gavrylyako, Phillip G. Bradfor...