Sciweavers

6555 search results - page 1193 / 1311
» Secure attribute-based systems
Sort
View
107
Voted
ARC
2010
Springer
178views Hardware» more  ARC 2010»
15 years 9 months ago
An Analysis of Delay Based PUF Implementations on FPGA
Physical Unclonable Functions promise cheap, efficient, and secure identification and authentication of devices. In FPGA devices, PUFs may be instantiated directly from FPGA fabri...
Sergey Morozov, Abhranil Maiti, Patrick Schaumont
138
Voted
AICCSA
2008
IEEE
283views Hardware» more  AICCSA 2008»
15 years 9 months ago
Performance analysis of identity management in the Session Initiation Protocol (SIP)
The Session Initiation Protocol (SIP) is a standard for managing IP multimedia sessions in the Internet. Identity management in SIP is a crucial security field that deals with id...
Yacine Rebahi, Jordi Jaen Pallares, Tuan Minh Nguy...
124
Voted
CEC
2008
IEEE
15 years 9 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
COLCOM
2008
IEEE
15 years 9 months ago
Access Control Model for Sharing Composite Electronic Health Records
The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of...
Jing Jin, Gail-Joon Ahn, Michael J. Covington, Xin...
118
Voted
HICSS
2008
IEEE
163views Biometrics» more  HICSS 2008»
15 years 9 months ago
Building a Test Suite for Web Application Scanners
This paper describes the design of a test suite for thorough evaluation of web application scanners. Web application scanners are automated, black-box testing tools that examine w...
Elizabeth Fong, Romain Gaucher, Vadim Okun, Paul E...
« Prev « First page 1193 / 1311 Last » Next »