Sciweavers

1045 search results - page 43 / 209
» On the Security of Digital Tachographs
Sort
View
CORR
2010
Springer
168views Education» more  CORR 2010»
13 years 8 months ago
Mobile Based Secure Digital Wallet for Peer to Peer Payment System
Majid Taghiloo, Mohammad Ali Agheli, Mohammad Reza...
IEEESP
2006
51views more  IEEESP 2006»
13 years 8 months ago
Digital Rights Management, Spyware, and Security
Edward W. Felten, J. Alex Halderman
DAC
2009
ACM
13 years 6 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
CCS
2009
ACM
14 years 1 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
IEEEARES
2008
IEEE
14 years 3 months ago
Static Validation of Licence Conformance Policies
Policy conformance is a security property gaining importance due to commercial interest like Digital Rights Management. It is well known that static analysis can be used to valida...
René Rydhof Hansen, Flemming Nielson, Hanne...