Sciweavers

485 search results - page 79 / 97
» Authentication by Biometric Verification
Sort
View
HICSS
2003
IEEE
129views Biometrics» more  HICSS 2003»
14 years 21 days ago
Peer-to-Peer Networks for Virtual Home Environments
This paper presents au approach to extend OSGi server based home networks with JXTA’s peer-topeer (PZP) technoIogy to a mzdti-server home environment connecting multiple private...
Chris Loeser, Wolfgang Müller 0003, Frank Ber...
HICSS
2002
IEEE
115views Biometrics» more  HICSS 2002»
14 years 11 days ago
Hermes--A Lean M-commerce Software Platform Utilizing Electronic Signatures
The world-wide growth of the mobile-telephony market opens the door for mobile commerce (m-commerce). For the restricted target platforms used for m-commerce such as mobile phones...
Sebastian Fischmeister, Günther Hagleitner, W...
HICSS
2002
IEEE
109views Biometrics» more  HICSS 2002»
14 years 11 days ago
Monitoring Software Requirements Using Instrumented Code
Ideally, software is derived from requirements whose properties have been established as good. However, it is difficult to define and analyze requirements. Moreover, derivation of...
William N. Robinson
IICS
2001
Springer
13 years 12 months ago
Hardware Security Concept for Spontaneous Network Integration of Mobile Devices
In this article we introduce an architecture of a mobile device that enables safe and authenticated data-transmission in a spontaneously configured network environment. The usage ...
Igor Sedov, Marc Haase, Clemens H. Cap, Dirk Timme...
ICALP
2010
Springer
13 years 9 months ago
From Secrecy to Soundness: Efficient Verification via Secure Computation
d Abstract) Benny Applebaum1 , Yuval Ishai2 , and Eyal Kushilevitz3 1 Computer Science Department, Weizmann Institute of Science 2 Computer Science Department, Technion and UCLA 3 ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz