Sciweavers

137 search results - page 15 / 28
» Memories: A Survey of Their Secure Uses in Smart Cards
Sort
View
IJIEM
2007
113views more  IJIEM 2007»
13 years 9 months ago
Fairness concerns in digital right management models
: Digital piracy is threatening the global multimedia content industry and blindly applied coercive Digital Right Management (DRM) policies do nothing but legitimizing this piracy....
Luc Bouganim, Philippe Pucheral
ACSAC
2000
IEEE
14 years 1 months ago
Applications in Health Care using Public-Key Certificates and Attribute Certificates
Security infrastructures are increasingly used in the health care and welfare sector, particularly for providing security, like confidentiality, authenticity, integrity, nonrepudi...
Petra Wohlmacher, Peter Pharow
ECWEB
2003
Springer
93views ECommerce» more  ECWEB 2003»
14 years 2 months ago
A Secure Electronic Payment Scheme for Charity Donations
Although many charities have a web presence, almost all of them have been designed to accept credit cards as the only means for making donations. The anonymity requirements of many...
Mansour A. Al-Meaither, Chris J. Mitchell
SP
1998
IEEE
14 years 1 months ago
Stack and Queue Integrity on Hostile Platforms
When computationally intensive tasks have to be carried out on trusted, but limited, platforms such as smart cards, it becomes necessary to compensate for the limited resources me...
Premkumar T. Devanbu, Stuart G. Stubblebine
TKDE
2008
123views more  TKDE 2008»
13 years 9 months ago
DiSC: Benchmarking Secure Chip DBMS
Secure chips, e.g., present in smart cards, USB dongles, i-buttons, are now ubiquitous in applications with strong security requirements. Moreover, they require embedded data manag...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral, ...