Sciweavers

651 search results - page 44 / 131
» Security of Electronic Money
Sort
View
ERSA
2009
109views Hardware» more  ERSA 2009»
13 years 6 months ago
An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors
An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring da...
Austin Rogers, Aleksandar Milenkovic
ECAGENTS
2001
Springer
150views ECommerce» more  ECAGENTS 2001»
14 years 1 months ago
Security Issues in M-Commerce: A Usage-Based Taxonomy
Abstract. M–commerce is a new area arising from the marriage of electronic commerce with emerging mobile and pervasive computing technology. The newness of this area—and the ra...
Suresh Chari, Parviz Kermani, Sean W. Smith, Leand...
SPW
1997
Springer
14 years 1 months ago
Secure Books: Protecting the Distribution of Knowledge
We undertook a project to secure the distribution of medical information using Wax. This is a proprietary hypertext-based system used for information such as treatment protocols, d...
Ross J. Anderson, Václav Matyás Jr.,...
HASE
2007
IEEE
14 years 3 months ago
Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities
Wireless LANs (WLAN) are becoming ubiquitous, as more and more consumer electronic equipments start to support them. This creates new security concerns, since hackers no longer ne...
Manuel Mendonça, Nuno Ferreira Neves
PETRA
2010
ACM
13 years 6 months ago
The security and privacy implications of using social networks to deliver healthcare
Healthcare technologies have tended to focus on electronic health records and devices (e.g., devices within the home for patients or handheld devices for nurses and physicians), a...
Carrie Gates, Matt Bishop