Sciweavers

651 search results - page 37 / 131
» Security of Electronic Money
Sort
View
EUNIS
2001
13 years 10 months ago
The influence of the Information System on administrative processes at the University of Latvia
: The goal of this paper is to describe how the development, implementation, and deployment of Information System of University of Latvia changed the life of the University and fac...
Janis Stonis, Laila Niedrite, Aivars Niedritis
DGO
2003
118views Education» more  DGO 2003»
13 years 10 months ago
Enabling Email Confidentiality through the use of Opportunistic Encryption
Software for encrypting email messages has been widely available for more than 15 years, but the emailusing public has failed to adopt secure messaging. This failure can be explai...
Simson L. Garfinkel
FAC
2008
67views more  FAC 2008»
13 years 9 months ago
Specification, proof, and model checking of the Mondex electronic purse using RAISE
This paper describes how the communication protocol of Mondex electronic purses can be specified and verified against desired security properties. The specification is developed by...
Chris George, Anne Elisabeth Haxthausen
CQRE
1999
Springer
14 years 1 months ago
Electronic Payments: Where Do We Go from Here?
Currently, the Internet and the World Wide Web on-line business is booming, with traffic, advertising and content growing at sustained exponential rates. However, the full potentia...
Markus Jakobsson, David M'Raïhi, Yiannis Tsio...
ACSC
2002
IEEE
14 years 1 months ago
Bracket Capabilities for Distributed Systems Security
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Research systems based on capabilit...
Mark Evered