Sciweavers

1045 search results - page 6 / 209
» On the Security of Digital Tachographs
Sort
View
IJNSEC
2010
146views more  IJNSEC 2010»
13 years 2 months ago
A Novel Digital Envelope Approach for A Secure E-Commerce Channel
Data privacy and integrity will be the crucial and significant factors in recent times for trade which will be transacted over the Internet through e-commerce and mcommerce channe...
Ramachandran Ganesan, Mohan Gobi, Kanniappan Vivek...
DEXAW
2005
IEEE
164views Database» more  DEXAW 2005»
14 years 1 months ago
Mobile Digital Rights Management: Security Requirements and Copy Detection Mechanisms
This paper addresses the specification of security modules in a Mobile Digital Rights Management (DRM) approach with a focus on copy detection mechanisms. The presented DRM approa...
Miguel Soriano, Stephan Flake, Jürgen Tacken,...
ACISP
2003
Springer
14 years 21 days ago
Robust Software Tokens - Yet Another Method for Securing User's Digital Identity
Abstract. This paper presents a robust software token that was developed to protect user’s digital identity by simple software-only techniques. This work is closely related to Ho...
Taekyoung Kwon
OZCHI
2006
ACM
14 years 1 months ago
Beyond security: implications for the future of federated digital identity management systems
Federated identity management is often viewed by corporations as a solution to support secure online commerce by synthesising complex and fragmented user information into a single...
Christine Satchell, Graeme G. Shanks, Steve Howard...
VEE
2012
ACM
200views Virtualization» more  VEE 2012»
12 years 3 months ago
Block storage virtualization with commodity secure digital cards
Smartphones, tablets and other mobile platforms typically accommodate bulk data storage with low-cost, FAT-formatted Secure Digital cards. When one uses a mobile device to run a f...
Harvey Tuch, Cyprien Laplace, Kenneth C. Barr, Bi ...