Sciweavers

3451 search results - page 193 / 691
» Security of Backup Data
Sort
View
CASCON
2006
98views Education» more  CASCON 2006»
15 years 6 months ago
A lightweight approach to state based security testing
State based protocols are protocols in which the handling of one message depends on the contents of previous messages. Testing such protocols, for security or for other purposes u...
Songtao Zhang, Thomas R. Dean, Scott Knight
CORR
2008
Springer
135views Education» more  CORR 2008»
15 years 4 months ago
Crossing Borders: Security and Privacy Issues of the European e-Passport
The first generation of European e-passports will be issued in 2006. We discuss how borders are crossed regarding the security and privacy erosion of the proposed schemes, and show...
Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs,...
IJNSEC
2007
115views more  IJNSEC 2007»
15 years 4 months ago
Novel Secure Communication Protocol for Conditional Access System
A protocol for secure communication between set-top box and smart card in conditional access system is proposed. The proposed protocol uses the Schnorr identification scheme to a...
Yongliang Liu, Xiaolin Yang, Hongxun Yao, Wen Gao
IJISEC
2010
121views more  IJISEC 2010»
15 years 3 months ago
Flowchart description of security primitives for controlled physical unclonable functions
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable and that behave like a random function when subjected to a challenge. Their use h...
Boris Skoric, Marc X. Makkes
GCA
2009
15 years 2 months ago
Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation
This paper highlights the need to meet both Grid user and resource provider security requirements, describing the rationale for securing Grid workflows: a set of tasks arranged int...
Po-Wah Yau, Allan Tomlinson