Sciweavers

205 search results - page 38 / 41
» Transactions in Java Card
Sort
View
NDSS
2002
IEEE
14 years 21 days ago
Advanced Client/Server Authentication in TLS
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approa...
Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsl...
ASWEC
2007
IEEE
13 years 11 months ago
Influence Control for Dynamic Reconfiguration
Influence control is a very challenging issue in dynamic reconfiguration and still not well addressed in the literature. This paper argues that dynamic reconfiguration influences s...
Zhikun Zhao, Wei Li
VAMOS
2010
Springer
13 years 9 months ago
Using Collaborations to Encapsulate Features? An Explorative Study
A feature is a program characteristic visible to an end-user. Current research strives to encapsulate the implementation of a feature in a module. Jak is a language extension to Ja...
Martin Kuhlemann, Norbert Siegmund, Sven Apel
SCANGIS
2003
13 years 9 months ago
Mobile E-Commerce and Location-Based Services: Technology and Requirements
Advances in Internet and network technology and the rapidly growing number of mobile personal devices result in the fast growth of Mobile E-Commerce, M-Commerce. In this paper we v...
Aphrodite Tsalgatidou, Jari Veijalainen, Jouni Mar...
ECIS
2000
13 years 9 months ago
The Extensible Markup Language - New Opportunities in the Area of EDI
: Only about 5% of the companies which could profit from EDI actually use it. The main reason is that especially small and medium-sized enterprises (SMEs) try to avoid the consider...
Tim Weitzel, Frank Ladner, Peter Buxmann