Sciweavers

536 search results - page 2 / 108
» Embedding Information Security into the Organization
Sort
View
CORR
2006
Springer
133views Education» more  CORR 2006»
13 years 7 months ago
A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements
Abstract. In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requiremen...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck
VTC
2007
IEEE
150views Communications» more  VTC 2007»
14 years 1 months ago
Antenna Advancement Techniques and Integration of RFID Electronics on Organic Substrates for UHF RFID Applications in Automotive
— In this paper, design requirements and advanced approaches for improved performance UHF radio frequency identification (RFID) tags are presented. Organic substrates are examine...
Li Yang, Amin Rida, Jiexin Li, Manos M. Tentzeris
ICASSP
2011
IEEE
12 years 10 months ago
Informed secure watermarking using optimal transport
This paper presents several watermarking methods preventing the estimation of the secret key by an adversary. The constraints for secure embedding using distribution matching, whe...
Patrick Bas
BDIM
2007
IEEE
115views Business» more  BDIM 2007»
13 years 7 months ago
Specifying Information Security Needs for the Delivery of High Quality Security Services
In this paper we present an approach for specifying respect to security. When an organization wants to secure and prioritizing information security requirements in organiza- its sy...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck
ISPEC
2005
Springer
14 years 17 days ago
Secure Software Delivery and Installation in Embedded Systems
ded abstract of this technical report appeared in the Proceedings of the First Information Security Practice and Experience Conference (ISPEC 2005) [AHS05].
André Adelsbach, Ulrich Huber, Ahmad-Reza S...