Sciweavers

1627 search results - page 226 / 326
» High Security Smartcards
Sort
View
WSC
2008
15 years 6 months ago
A methodology for input data management in discrete event simulation projects
Discrete event simulation (DES) projects rely heavily on high input data quality. Therefore, the input data management process is very important and, thus, consumes an extensive a...
Anders Skoogh, Björn Johansson
CSREASAM
2008
15 years 5 months ago
Password Entry Scheme Resistant to Eavesdropping
- We propose an authentication scheme resistant to eavesdropping attacks. Users select an alphanumeric password with a length of 9-15 symbols. They can use this password in the tra...
Bogdan Hoanca, Kenrick J. Mock
MKWI
2008
168views Business» more  MKWI 2008»
15 years 5 months ago
Towards Automated Risk Identification in Service-Oriented Architectures
: IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [G...
Lutz Lowis
SICHERHEIT
2008
15 years 5 months ago
Efficiency Improvement for NTRU
Abstract: The NTRU encryption scheme is an interesting alternative to well-established encryption schemes such as RSA, ElGamal, and ECIES. The security of NTRU relies on the hardne...
Johannes Buchmann, Martin Döring, Richard Lin...
FLAIRS
2004
15 years 5 months ago
Finding Partners to Form Information Sharing Networks in Open Multi-Agent Systems
Information quality assurance despite the existence of uncertainty about sources can be investigated in the context of soft security where an agent maintains trustworthiness evalu...
K. Suzanne Barber, Jisun Park