Sciweavers

383 search results - page 28 / 77
» Knowledge Integration as a Key Problem in an ERP Implementat...
Sort
View
WISTP
2010
Springer
13 years 5 months ago
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
Michael Braun, Ulrike Meyer, Susanne Wetzel
WISA
2004
Springer
14 years 27 days ago
Encrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
Markku-Juhani Olavi Saarinen
CIMCA
2006
IEEE
14 years 1 months ago
A Knowledge-based Security Policy Framework for Business Process Management
Business Process Management (BPM) is often a key component of the business change. Business rules, whether embedded within BPM or on their own, have begun playing an ever-increasi...
Dong Huang, Yi Yang, Jacques Calmet
INTEGRATION
2007
100views more  INTEGRATION 2007»
13 years 7 months ago
A fast pipelined multi-mode DES architecture operating in IP representation
The Data Encryption Standard (DES) is a cipher that is still used in a broad range of applications, from smartcards, where it is often implemented as a tamperresistant embedded co...
Sylvain Guilley, Philippe Hoogvorst, Renaud Pacale...
CIB
2004
83views more  CIB 2004»
13 years 7 months ago
Web-Based Semantic Pervasive Computing Services
Abstract-- Pervasive Computing refers to a seamless and invisible computing environment which provides dynamic, proactive and context-aware services to the user by acquiring contex...
Yugyung Lee, Soon Ae Chun, James Geller