Sciweavers

242 search results - page 39 / 49
» Practical Digital Signature Generation Using Biometrics
Sort
View
ACSAC
2001
IEEE
13 years 11 months ago
CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59
The security of electronic payment protocols is of interest to researchers in academia and industry. While the ultimate objective is the safest and most secure protocol, convenien...
Albert Levi, Çetin Kaya Koç
IIE
2007
85views more  IIE 2007»
13 years 7 months ago
Half-Baked Logo Microworlds as Boundary Objects in Integrated Design
The paper addresses the problem of fragmentation of the communities involved in the design of digital media for education. It draws on the experience gained at the Educational Tec...
Chronis Kynigos
IJNSEC
2011
272views more  IJNSEC 2011»
13 years 2 months ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...
SASN
2003
ACM
14 years 26 days ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
ISSTA
2004
ACM
14 years 1 months ago
Testing malware detectors
In today’s interconnected world, malware, such as worms and viruses, can cause havoc. A malware detector (commonly known as virus scanner) attempts to identify malware. In spite...
Mihai Christodorescu, Somesh Jha