Sciweavers

62 search results - page 4 / 13
» Toward a Taxonomy and Costing Method for Security Services
Sort
View
ICSNC
2007
IEEE
14 years 2 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...
FC
2010
Springer
158views Cryptology» more  FC 2010»
13 years 7 months ago
A Secure and Privacy-Preserving Targeted Ad-System
Thanks to its low product-promotion cost and its efficiency, targeted online advertising has become very popular. Unfortunately, being profile-based, online advertising methods vio...
Elli Androulaki, Steven M. Bellovin
ISJGP
2010
13 years 4 months ago
On the Hardware Implementation Cost of Crypto-Processors Architectures
A variety of modern technologies such as networks, Internet, and electronic services demand private and secure communications for a great number of everyday transactions. Security ...
Nicolas Sklavos
IEEEHPCS
2010
13 years 6 months ago
Semantic model checking security requirements for web services
Model checking is a formal verification method widely accepted in the web service world because of its capability to reason about service behaviors, at their process-level. It ha...
L. Boaro, E. Glorio, Francesco Pagliarecci, Luca S...
ECBS
2008
IEEE
113views Hardware» more  ECBS 2008»
13 years 7 months ago
Towards Secure Mobile Payment Based on SIP
Mobile payment has some unique advantages over more traditional payment methods in, for example, TV shopping and mobile multimedia services. Unfortunately, most existing mobile pa...
Ge Zhang, Feng Cheng 0002, Christoph Meinel