Sciweavers

623 search results - page 30 / 125
» A proposal for Ontology Security Standards
Sort
View
PKC
2010
Springer
150views Cryptology» more  PKC 2010»
13 years 11 months ago
Security of Encryption Schemes in Weakened Random Oracle Models
Liskov proposed several weakened versions of the random oracle model, called weakened random oracle models (WROMs), to capture the vulnerability of ideal compression functions, wh...
Akinori Kawachi, Akira Numayama, Keisuke Tanaka, K...
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
14 years 2 months ago
The Security of EPC Gen2 Compliant RFID Protocols
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard the de facto specification for inexpensive tags in the RFID industry. EPCGen2 supports only very b...
Mike Burmester, Breno de Medeiros
CRISIS
2008
13 years 9 months ago
An ontology-based approach to react to network attacks
To address the evolution of security incidents in current communication networks it is important to react quickly and efficiently to an attack. The RED (Reaction after Detection) ...
Nora Cuppens-Boulahia, Frédéric Cupp...
ICDE
2008
IEEE
152views Database» more  ICDE 2008»
14 years 9 months ago
Ontology-Aware Search on XML-based Electronic Medical Records
As the use of Electronic Medical Records (EMRs) becomes more widespread, so does the need for effective information discovery on them. Recently proposed EMR standards are XML-based...
Anand Ranganathan, Fernando Farfán, Redmond...
ACSAC
2001
IEEE
13 years 11 months ago
CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59
The security of electronic payment protocols is of interest to researchers in academia and industry. While the ultimate objective is the safest and most secure protocol, convenien...
Albert Levi, Çetin Kaya Koç