Sciweavers

1627 search results - page 319 / 326
» High Security Smartcards
Sort
View
ECIS
2000
14 years 3 days ago
Trust in Electronic Learning and Teaching Relationships: The Case of WINFO-Line
Electronic relationships in the context of electronic commerce and especially in the context of electronic learning and teaching are on the rise. However, besides the well known te...
Harald F. O. von Kortzfleisch, Udo Winand
WSC
1998
14 years 3 days ago
Avoiding the Blues for Airline Travelers
The fast growth in airline passenger traffic combined with the slow growth in airport capacity worldwide is putting a severe strain on the capability of airlines to adapt their pr...
Jane L. Snowdon, Soad El-Taji, Mario Montevecchi, ...
WOTUG
2007
13 years 12 months ago
A Process Oriented Approach to USB Driver Development
Abstract. Operating-systems are the core software component of many modern computer systems, ranging from small specialised embedded systems through to large distributed operating-...
Carl G. Ritson, Fred R. M. Barnes
CRYPTO
2010
Springer
188views Cryptology» more  CRYPTO 2010»
13 years 12 months ago
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
Homomorphic encryption (HE) schemes enable computing functions on encrypted data, by means of a public Eval procedure that can be applied to ciphertexts. But the evaluated ciphert...
Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
DIMVA
2009
13 years 12 months ago
A Service Dependency Modeling Framework for Policy-Based Response Enforcement
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
Nizar Kheir, Hervé Debar, Fréd&eacut...