Sciweavers

651 search results - page 92 / 131
» Security of Electronic Money
Sort
View
WICSA
2007
13 years 10 months ago
Assessing a Multi-Site Development Organization for Architectural Compliance
Multi-site development organizations require coordination and communication efforts between different sites to ensure successful distributed development. These efforts need to be ...
Viktor Clerc, Patricia Lago, Hans van Vliet
COMPUTER
2010
147views more  COMPUTER 2010»
13 years 9 months ago
Authentication by Biometric Verification
:-Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human b...
Ron Vetter
COMPUTER
2008
86views more  COMPUTER 2008»
13 years 9 months ago
SSL/TLS Session-Aware User Authentication
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, such as Internet banking. SSL/TLS session-aware user authentication can be used to ...
Rolf Oppliger, Ralf Hauser, David A. Basin
CORR
1999
Springer
70views Education» more  CORR 1999»
13 years 8 months ago
Restart Strategies and Internet Congestion
We recently presented a methodology to quantitatively reduce the average time and variance in the time required to execute electronic transactions in a network environment such as...
Sebastian M. Maurer, Bernardo A. Huberman
FORTE
2009
13 years 6 months ago
Epistemic Logic for the Applied Pi Calculus
We propose an epistemic logic for the applied pi calculus, which is a variant of the pi calculus with extensions for modeling cryptographic protocols. In such a calculus, the secur...
Rohit Chadha, Stéphanie Delaune, Steve Krem...