Sciweavers

1045 search results - page 122 / 209
» On the Security of Digital Tachographs
Sort
View
SSWMC
2004
13 years 11 months ago
Signature-embedding in printed documents for security and forensic applications
Despite the increase in email and other forms of digital communication, the use of printed documents continues to increase every year. Many types of printed documents need to be &...
Aravind K. Mikkilineni, Gazi N. Ali, Pei-Ju Chiang...
ACSAC
2009
IEEE
14 years 2 months ago
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
Audit logs, providing information about the current and past states of systems, are one of the most important parts of modern computer systems. Providing security for audit logs on...
Attila Altay Yavuz, Peng Ning
CCS
2006
ACM
14 years 1 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
ECWEB
2007
Springer
155views ECommerce» more  ECWEB 2007»
14 years 2 months ago
A Secure Payment Protocol for Restricted Connectivity Scenarios in M-Commerce
A significant number of mobile payment systems have been proposed in recent years, most of them based on a scenario where all the entities are directly connected one to another (fo...
Jesús Téllez Isaac, José Sier...
JSW
2008
240views more  JSW 2008»
13 years 10 months ago
A Secure e-Health Architecture based on the Appliance of Pseudonymization
Due to the cost pressure on the health care system an increase in the need for electronic healthcare records (EHR) could be observed in the last decade, because EHRs promise massiv...
Bernhard Riedl, Veronika Grascher, Thomas Neubauer