Sciweavers

2517 search results - page 317 / 504
» Secure Deployment of Components
Sort
View
AINA
2004
IEEE
14 years 1 months ago
Peer-To-Peer Technology for Interconnecting Web Services in Heterogeneous Networks
The interconnection of software components is a key to enabling collaborative work. However, technology differences and security barriers like firewalls often hinder establishing ...
Tim Schattkowsky, Christoph Loeser, Wolfgang M&uum...
FPL
2006
Springer
127views Hardware» more  FPL 2006»
14 years 28 days ago
FPGA Vendor Agnostic True Random Number Generator
This paper describes a solution for the generation of true random numbers in a purely digital fashion; making it suitable for any FPGA type, because no FPGA vendor specific featur...
Dries Schellekens, Bart Preneel, Ingrid Verbauwhed...
ECIS
2000
13 years 10 months ago
Organizational, Technological and Regulatory Challenges for Realizing Electronic Government
In this paper we discuss the main challenges faced by electronic government initiatives. First, the components of and the demand for electronic government services are identified. ...
Georg Aichholzer, Rupert Schmutzer
CHES
2010
Springer
133views Cryptology» more  CHES 2010»
13 years 10 months ago
ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware
This paper describes and analyzes the security of a general-purpose cryptographic function design, with application in RFID tags and sensor networks. Based on these analyzes, we su...
Stéphane Badel, Nilay Dagtekin, Jorge Nakah...
BNCOD
2009
125views Database» more  BNCOD 2009»
13 years 7 months ago
The Adaptation Model of a Runtime Adaptable DBMS
Nowadays maintenance of database management systems (DBMSs) often requires offline operations for enhancement of functionality or security updates. This hampers the availability of...
Florian Irmert, Thomas Fischer, Frank Lauterwald, ...