Sciweavers

271 search results - page 13 / 55
» A New Electronic Cash Model
Sort
View
TACAS
2007
Springer
158views Algorithms» more  TACAS 2007»
14 years 1 months ago
Automatic Analysis of the Security of XOR-Based Key Management Schemes
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
Véronique Cortier, Gavin Keighren, Graham S...
JOT
2008
142views more  JOT 2008»
13 years 7 months ago
Mining Edgar Tender Offers
This paper describes how use the HTMLEditorKit to perform web data mining on EDGAR (Electronic Data-Gathering, Analysis, and Retrieval system). EDGAR is the SEC's (U.S. Secur...
Douglas Lyon
SOUPS
2010
ACM
13 years 11 months ago
Usably secure, low-cost authentication for mobile banking
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
Saurabh Panjwani, Edward Cutrell
IWANN
2001
Springer
13 years 12 months ago
From Embryonics to POEtic Machines
The space of bio-inspired hardware can be partitioned along three axes: phylogeny, ontogeny, and epigenesis. We refer to this as the POE model. Our Embryonics (for embryonic electr...
Daniel Mange, André Stauffer, Gianluca Temp...
HICSS
2007
IEEE
113views Biometrics» more  HICSS 2007»
14 years 1 months ago
Understanding Changes in Consumer Payment Habits - Do Mobile Payments and Electronic Invoices Attract Consumers?
Mobile payment services have, thus far, failed to entice consumers. An apparent conclusion is that these services have failed to meet consumers’ payment needs. Deeper understand...
Tomi Dahlberg, Anssi Öörni