Sciweavers

1573 search results - page 238 / 315
» Strong User Authentication
Sort
View
FC
1999
Springer
184views Cryptology» more  FC 1999»
15 years 2 months ago
Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems
Abstract. Anonymity features of electronic payment systems are important for protecting privacy in an electronic world. However, complete anonymity prevents monitoring financial t...
Tomas Sander, Amnon Ta-Shma
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
15 years 2 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
WCNC
2010
IEEE
15 years 1 months ago
Interference Analysis in Time and Frequency Asynchronous Network MIMO OFDM Systems
—It is well known that symbol timing offsets larger than the cyclic prefix as well as carrier frequency offsets between transmitter and receiver stations destroy the orthogonali...
Vincent Kotzsch, Gerhard Fettweis
EUROCRYPT
2006
Springer
15 years 1 months ago
Cryptography in Theory and Practice: The Case of Encryption in IPsec
Abstract. This paper studies the gaps that exist between cryptography as studied in theory, as defined in standards, as implemented by software engineers, and as actually consumed ...
Kenneth G. Paterson, Arnold K. L. Yau
CIVR
2005
Springer
165views Image Analysis» more  CIVR 2005»
14 years 12 months ago
The Use and Utility of High-Level Semantic Features in Video Retrieval
Abstract. This paper investigates the applicability of high-level semantic features for video retrieval using the benchmarked data from TRECVID 2003 and 2004, addressing the contri...
Michael G. Christel, Alexander G. Hauptmann