Sciweavers

651 search results - page 66 / 131
» Security of Electronic Money
Sort
View
EUROPKI
2008
Springer
13 years 10 months ago
Efficient Generic Forward-Secure Signatures and Proxy Signatures
We propose a generic method to construct forward-secure signature schemes from standard signature schemes. The proposed construction is more computationally efficient than previous...
Basel Alomair, Krishna Sampigethaya, Radha Poovend...
ISTA
2007
13 years 10 months ago
Return on Security Investments - Design Principles of Measurement Systems Based on Capital Budgeting
: IT-security has become a vital factor in electronic commerce nowadays. Thus, investments have to be made in order to safeguard security. However, the benefits of these investment...
Jan vom Brocke, Gereon Strauch, Christian Buddendi...
JCS
2002
132views more  JCS 2002»
13 years 8 months ago
Checking Secure Interactions of Smart Card Applets: Extended Version
Abstract. This paper presents an approach enabling a smart card issuer to verify that a new applet securely interacts with already downloaded applets. A security policy has been de...
Pierre Bieber, Jacques Cazin, Pierre Girard, Jean-...
BLISS
2009
IEEE
13 years 10 months ago
Mechatronic Security and Robot Authentication
Robot Security is becoming more and more a serious issue for many modern applications. Robot Security matters are still not intensively addressed in the published literature. The ...
Wael Adi
ICSE
2007
IEEE-ACM
14 years 9 months ago
Engineering Medical Information Systems: Architecture, Data and Usability & Security
There has been increasing pressure on the health care sector to adopt information technologies to rationalize service delivery and increase service quality. Medical information sy...
Jens H. Weber-Jahnke, Morgan Price