Government-endorsed security evaluations, like those performed under the Common Criteria (CC), use established techniques of software quality assurance to try to evaluate product ...
Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
The objective of this paper explores a bibliometric approach to quantitatively evaluating the characteristics in the research aspect of home networking, retrieving the related lit...
Online payments in business-to-consumer electronic commerce are mainly made with credit cards. Fraud and chargebacks are a significant issue for merchants and payment card brands, ...
“Culture” plays an important role in the design field, and “cross cultural design” will be a key design evaluation point in the future. Designing “culture” into modern ...