Sciweavers

1573 search results - page 109 / 315
» Strong User Authentication
Sort
View
WDAG
2000
Springer
125views Algorithms» more  WDAG 2000»
15 years 1 months ago
Establishing Business Rules for Inter-Enterprise Electronic Commerce
Conventional mechanisms for electronic commerce provide strong means for securing transfer of funds, and for ensuring such things as authenticity and non-repudiation. But they gene...
Victoria Ungureanu, Naftaly H. Minsky
CCS
2010
ACM
14 years 10 months ago
Dismantling SecureMemory, CryptoMemory and CryptoRF
The Atmel chip families SecureMemory, CryptoMemory, and CryptoRF use a proprietary stream cipher to guarantee authenticity, confidentiality, and integrity. This paper describes th...
Flavio D. Garcia, Peter van Rossum, Roel Verdult, ...
COMSIS
2006
100views more  COMSIS 2006»
14 years 10 months ago
Holistic Approach to Wep Protocol in Securing Wireless Network Infrastructure
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) ...
Radomir Prodanovic, Dejan Simic
FAST
2009
14 years 7 months ago
The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance
As increasing amounts of valuable information are produced and persist digitally, the ability to determine the origin of data becomes important. In science, medicine, commerce, an...
Ragib Hasan, Radu Sion, Marianne Winslett
CDVE
2009
Springer
15 years 4 months ago
DooSo6: Easy Collaboration over Shared Projects
Abstract. Existing tools for supporting parallel work feature some disadvantages that prevent them to be widely used. Very often they require a complex installation and creation of...
Claudia-Lavinia Ignat, Gérald Oster, Pascal...