Sciweavers

651 search results - page 30 / 131
» Security of Electronic Money
Sort
View
65
Voted
SAFECOMP
1998
Springer
15 years 1 months ago
EURIS, a Specification Method for Distributed Interlockings
Abstract. Safety systems for railways have shifted from electronic relays to more computer-oriented approaches. This article highlights the language EURIS from NS Railinfrabeheer, ...
Fokko van Dijk, Wan Fokkink, Gea Kolk, Paul van de...
73
Voted
DATE
2007
IEEE
73views Hardware» more  DATE 2007»
15 years 4 months ago
Design methods for security and trust
The design of ubiquitous and embedded computers focuses on cost factors such as area, power-consumption, and performance. Security and trust properties, on the other hand, are oft...
Ingrid Verbauwhede, Patrick Schaumont
76
Voted
ISW
2000
Springer
15 years 1 months ago
Towards a Practical Secure Framework for Mobile Code Commerce
Securing the mobile code commerce is not an easy task at all. We propose in this paper a framework to tackle this problem. In a first step, we analyse the general issues that must ...
Gaël Hachez, Laurent Den Hollander, Mehrdad J...
95
Voted
ICPR
2010
IEEE
14 years 7 months ago
Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding
In this article, a new fragile, blind, high payload capacity, ROI (Region of Interest) preserving Medical image watermarking (MIW) technique in the spatial domain for grayscale med...
Malay Kumar Kundu, Sudeb Das
ISW
2000
Springer
15 years 1 months ago
Performance Analysis of Secure Web Server Based on SSL
Abstract. In recent years, protocols have been developed to ensure secure communications over the Internet, e.g., the secure sockets layer (SSL) and secure electronic transaction (...
Xiaodong Lin, Johnny W. Wong, Weidong Kou