Sciweavers

590 search results - page 71 / 118
» Security Issues in VOIP Applications
Sort
View
ISI
2007
Springer
13 years 7 months ago
Outil autonome de surveillance de grilles
ABSTRACT. Grids have become very complex. It makes the deployment and maintenance of systems a difficult task requiring lots of efforts from administrators. We believe that peer-t...
Laurent Baduel, Satoshi Matsuoka
HICSS
2007
IEEE
134views Biometrics» more  HICSS 2007»
14 years 2 months ago
Barriers to Adoption of e-Government
Technology adoption is well defined in e-business. The environment within which leaders must act in government is significantly different that that navigated by business leaders. ...
Wm. Arthur Conklin
WOWMOM
2005
ACM
86views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
The Wireless Opaque Channel to Contrast Information Leakage
Widespread adoption of wireless devices has considerably enlarged the domain of user applications, but consequently specific issues related to a secure use of these devices arise...
Marco Domenico Aime, Andrea S. Atzeni, Antonio Lio...
CHI
2010
ACM
14 years 1 months ago
Vote-o-graph: a dishonest touchscreen voting system
We present Vote-O-Graph, an experimental touchscreen voting system designed to simulate reported interface issues in existing electronic voting systems. Touchscreen miscalibration...
Andrea L. Mascher, Paul T. Cotton, Douglas W. Jone...
NORDSEC
2009
Springer
14 years 15 days ago
Formal Analysis of the Estonian Mobile-ID Protocol
In this paper, we report the results of the formal analysis performed on the Estonian Mobile-ID protocol (deployed since 2008), allowing citizens and permanent residents of Estonia...
Peeter Laud, Meelis Roos