Sciweavers

50 search results - page 8 / 10
» Secure Ownership and Ownership Transfer in RFID Systems
Sort
View
HICSS
2007
IEEE
156views Biometrics» more  HICSS 2007»
14 years 1 months ago
Bridging Business Value Models and Process Models in Aviation Value Webs via Possession Rights
While exploring value webs -cooperating enterprises- it is common to view such webs from multiple perspectives: (1) the business value perspective, (2) the business process perspe...
Vincent Pijpers, Jaap Gordijn
CCS
2003
ACM
14 years 26 days ago
Origin authentication in interdomain routing
Attacks against Internet routing are increasing in number and severity. Contributing greatly to these attacks is the absence of origin authentication: there is no way to validate ...
William Aiello, John Ioannidis, Patrick Drew McDan...
OOPSLA
2009
Springer
14 years 2 months ago
Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations
An object diagram makes explicit the object structures that are only implicit in a class diagram. An object diagram may be missing and must extracted from the code. Alternatively,...
Marwan Abi-Antoun, Jonathan Aldrich
IEEEARES
2010
IEEE
13 years 5 months ago
Using Smart Cards for Tamper-Proof Timestamps on Untrusted Clients
Online auctions of governmental bonds and CO2 certificates are challenged by high availability requirements in face of high peak loads around the auction deadline. Traditionally, t...
Guenther Starnberger, Lorenz Froihofer, Karl M. G&...
APCCAS
2002
IEEE
156views Hardware» more  APCCAS 2002»
14 years 18 days ago
Bit-plane watermarking for zerotree-coded images
In this paper, we develop a robust bit-plane watermarking technique based on zerotree coding. A robust watermark is an imperceptible but indelible code that can be used for owners...
Shih-Hsuan Yang, Hsin-Chang Chen