Sciweavers

1045 search results - page 4 / 209
» On the Security of Digital Tachographs
Sort
View
ACSAC
2000
IEEE
13 years 12 months ago
Personal Security Environment on Palm PDA
Digital signature schemes are based on the assumption that the signing key is kept in secret. Ensuring that this assumption holds is one of the most crucial problems for all curre...
Margus Freudenthal, S. Heiberg, Jan Willemson
ICDIM
2008
IEEE
14 years 1 months ago
A framework for transient objects in Digital Libraries
Digital Libraries maintain information lifecycles for the digital objects contained therein. Typically these information lifecycles stipulate that a digital object is deleted at t...
Tjalve Aarflot, Cathal Gurrin, Dag Johansen
ICCSA
2004
Springer
14 years 26 days ago
Practical Digital Signature Generation Using Biometrics
Abstract. It is desirable to generate a digital signature using biometrics but not practicable because of its inaccurate measuring and potential hill-climbing attacks, without usin...
Taekyoung Kwon, Jaeil Lee
COMPSAC
2009
IEEE
14 years 2 months ago
Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer?
Abstract—While log data are being increasingly used as digital evidence in judicial disputes, the extent to which existing secure logging protocols used to collect log data fulï¬...
Rafael Accorsi
ICMB
2006
IEEE
206views Business» more  ICMB 2006»
14 years 1 months ago
E-Pass Using DRM in Symbian v8 OS and TrustZone : Securing Vital Data on Mobile Devices
The mobile phone industry has established a large customer base market, providing a wide range of mobile applications from voice and data services to digital media such as digital...
Wan Huzaini Wan Hussin, Reuben Edwards, Paul Coult...