Sciweavers

3482 search results - page 239 / 697
» Designing for security
Sort
View
PST
2004
13 years 11 months ago
Online Gaming Crime and Security Issue - Cases and Countermeasures from Taiwan
Along with the growth of information technology, online gaming has become a very successful and outstanding industry, especially in Asia. However due to the lack of legal regulatio...
Ying-Chieh Chen, Patrick S. Chen, Ronggong Song, L...
ASE
2008
120views more  ASE 2008»
13 years 9 months ago
Requirements model generation to support requirements elicitation: the Secure Tropos experience
In the last years several efforts have been devoted by researchers in the Requirements Engineering community to the development of methodologies for supporting designers during req...
Nadzeya Kiyavitskaya, Nicola Zannone
IEICET
2008
124views more  IEICET 2008»
13 years 9 months ago
A Secure Content Delivery System Based on a Partially Reconfigurable FPGA
We developed a content delivery system using a partially reconfigurable FPGA to securely distribute digital content on the Internet. With partial reconfigurability of a Xilinx Vir...
Yohei Hori, Hiroyuki Yokoyama, Hirofumi Sakane, Ke...
IJNSEC
2008
140views more  IJNSEC 2008»
13 years 9 months ago
A Secure Group Key Management Scheme for Wireless Cellular Systems
In wireless networks, secure multicast protocols are more difficult to implement efficiently due to the dynamic nature of the multicast group and the scarcity of bandwidth at the ...
Hwa Young Um, Edward J. Delp
CORR
2007
Springer
147views Education» more  CORR 2007»
13 years 9 months ago
Coding Solutions for the Secure Biometric Storage Problem
—The paper studies the problem of securely storing biometric passwords, such as fingerprints and irises. With the help of coding theory Juels and Wattenberg derived in 1999 a sc...
Davide Schipani, Joachim Rosenthal