Sciweavers

507 search results - page 57 / 102
» The XTR Public Key System
Sort
View
108
Voted
ACMICEC
2003
ACM
113views ECommerce» more  ACMICEC 2003»
15 years 6 months ago
PayCash: a secure efficient Internet payment system
This paper describes PayCash, an Internet payment system that was designed to offer strong security and privacy protection. This system is based on the concept of electronic cash,...
Jon M. Peha, Ildar M. Khamitov
HICSS
2009
IEEE
215views Biometrics» more  HICSS 2009»
15 years 7 months ago
A Real World Perspective: Employee Perspectives of Employer Sponsored Personal Health Record (PHR) Systems
Many employers now provide electronic personal health records (PHR) to employees as part of a free or low cost health benefit program. This paper reports findings from a survey di...
Juanita Dawson, Benjamin L. Schooley, Bengisu Tulu
122
Voted
EIT
2008
IEEE
15 years 2 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
92
Voted
SRDS
2003
IEEE
15 years 6 months ago
Federation Web: A Scheme to Compound Authorization Chains on Large-Scale Distributed Systems
Traditional security systems are not easily scalable and can become single points of failure or performance bottlenecks when used on a large-scale distributed system such as the I...
Altair Olivo Santin, Joni da Silva Fraga, Frank Si...
HICSS
2006
IEEE
101views Biometrics» more  HICSS 2006»
15 years 7 months ago
IT Projects: Conflict, Governance, and Systems Thinking
Triggered by several embarrassing (and costly) IT project collapses in New Zealand’s public sector, a government report found that effective project control required good govern...
David Johnstone, Sid L. Huff, Beverley G. Hope