Sciweavers

506 search results - page 59 / 102
» Electronic-internet business and security
Sort
View
FC
1998
Springer
156views Cryptology» more  FC 1998»
14 years 2 months ago
Assessment of Threats for Smart Card Based Electronic Cash
The security of smart card based electronic cash have been receiving significant attention recently. However, there has been little systematic analysis or quantification of the imp...
Kazuo J. Ezawa, Gregory Napiorkowski
ISSE
2008
13 years 11 months ago
Challenges for the Protection of Critical ICT-Based Financial Infrastructures
Abstract: This paper, entitled Challenges for the Protection of Critical ICTBased Financial Infrastructures for the next 5 years, will describe the outcomes of a recently held work...
Bernhard M. Hämmerli, Henning H. Arendt
ICWS
2004
IEEE
13 years 11 months ago
Grid Resources for Industrial Applications
We introduce Grid Resources for Industrial Applications (GRIA), a project that aims to enable commercial use of the Grid. GRIA enables service providers to rent out spare CPU cycl...
Steve Taylor, Mike Surridge, Darren Marvin
CONCUR
2010
Springer
13 years 10 months ago
Trust in Anonymity Networks
Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusi...
Vladimiro Sassone, Sardaouna Hamadou, Mu Yang
ICC
2007
IEEE
122views Communications» more  ICC 2007»
14 years 4 months ago
Detecting HTTP Tunnels with Statistical Mechanisms
Abstract— Application Level Gateways and firewalls are commonly used to enforce security policies at network boundaries, especially in large-sized business networks. However, se...
Manuel Crotti, Maurizio Dusi, Francesco Gringoli, ...