Sciweavers

574 search results - page 80 / 115
» Responsive Security for Stored Data
Sort
View
DSS
2006
170views more  DSS 2006»
13 years 7 months ago
Adoption of internet banking: An empirical study in Hong Kong
This study investigates how customers perceive and adopt Internet Banking (IB) in Hong Kong. We developed a theoretical model based on the Technology Acceptance Model (TAM) with a...
T. C. Edwin Cheng, David Y. C. Lam, Andy C. L. Yeu...
CARDIS
1998
Springer
109views Hardware» more  CARDIS 1998»
13 years 12 months ago
The Vault, an Architecture for Smartcards to Gain Infinite Memory
Smartcard chips vendors have always done their best to embed more memory inside cards. These efforts are driven to allow their customers smartcard manufacturers - to mask more soft...
Patrick Biget
EUROSYS
2008
ACM
14 years 4 months ago
DepSpace: a byzantine fault-tolerant coordination service
The tuple space coordination model is one of the most interesting coordination models for open distributed systems due to its space and time decoupling and its synchronization pow...
Alysson Neves Bessani, Eduardo Adílio Pelin...
DELOS
2000
13 years 9 months ago
Using the Wavelet Transform to Learn from User Feedback
User feedback has proven very successful to query large multimedia databases. Due to the nature of the data representation and the mismatch between mathematical models and human p...
Ilaria Bartolini, Paolo Ciaccia, Florian Waas
DATE
2008
IEEE
114views Hardware» more  DATE 2008»
14 years 2 months ago
Operating System Controlled Processor-Memory Bus Encryption
—Unencrypted data appearing on the processor– memory bus can result in security violations, e.g., allowing attackers to gather keys to financial accounts and personal data. Al...
Xi Chen, Robert P. Dick, Alok N. Choudhary