Sciweavers

339 search results - page 42 / 68
» The Evolution of RFID Security
Sort
View
98
Voted
CORR
2010
Springer
106views Education» more  CORR 2010»
15 years 15 days ago
A security framework for SOA applications in mobile environment
A Rapid evolution of mobile technologies has led to the development of more sophisticated mobile devices with better storage, processing and transmission power. These factors enab...
Johnneth de Sene Fonseca, Zair Abdelouahab, Deniva...
ICSE
2007
IEEE-ACM
16 years 15 days ago
Engineering Medical Information Systems: Architecture, Data and Usability & Security
There has been increasing pressure on the health care sector to adopt information technologies to rationalize service delivery and increase service quality. Medical information sy...
Jens H. Weber-Jahnke, Morgan Price
EMISA
2004
Springer
15 years 5 months ago
A Virtual Laboratory for IT Security Education
Abstract: Success of IT security not only depends on the evolution of technologies, but also relies on the knowledge of IT-Personnel and the level of their IT-security education. I...
Ji Hu, Dirk Cordel, Christoph Meinel
IACR
2011
223views more  IACR 2011»
14 years 1 days ago
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping
Abstract. We describe and analyze the password-based key establishment protocol PACE v2 Integrated Mapping (IM), an evolution of PACE v1 jointly proposed by Gemalto and Sagem S´ec...
Jean-Sébastien Coron, Aline Gouget, Thomas ...
ACSAC
2004
IEEE
15 years 4 months ago
PEACE: A Policy-Based Establishment of Ad-hoc Communities
Ad-hoc networks are perceived as communities of autonomous devices that interconnect with each other. Typically, they have dynamic topologies and cannot rely on a continuous conne...
Sye Loong Keoh, Emil Lupu, Morris Sloman