Sciweavers

107 search results - page 17 / 22
» Vulnerabilities in Biometric Encryption Systems
Sort
View
FC
2010
Springer
135views Cryptology» more  FC 2010»
14 years 15 days ago
Multichannel Protocols to Prevent Relay Attacks
A number of security systems, from Chip-and-PIN payment cards to contactless subway and train tokens, as well as secure localization systems, are vulnerable to relay attacks. Encry...
Frank Stajano, Ford-Long Wong, Bruce Christianson
HICSS
2008
IEEE
88views Biometrics» more  HICSS 2008»
14 years 3 months ago
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence
Abstract: We adapt the event study methodology from research in financial economics to study the impact of government enforcement and economic opportunities on information security...
Ivan P. L. Png, Chen-Yu Wang, Qiu-Hong Wang
HICSS
2005
IEEE
110views Biometrics» more  HICSS 2005»
14 years 2 months ago
A Trust-based Negotiation Mechanism for Decentralized Economic Scheduling
Abstract— This paper presents a decentralized negotiation protocol for cooperative economic scheduling in a supply chain environment. For this purpose we designed autonomous agen...
Tim Stockheim, Oliver Wendt, Michael Schwind
HICSS
2005
IEEE
133views Biometrics» more  HICSS 2005»
14 years 2 months ago
Strategic Integration: A Knowledge Management Approach to Crisis Management
Every day, businesses are threatened by crises that could have been prevented or their impact lessened if only knowledge of causal and influencing factors were known and better ma...
Wei-Tsong Wang, Salvatore Belardo
DATE
2007
IEEE
92views Hardware» more  DATE 2007»
14 years 2 months ago
Overcoming glitches and dissipation timing skews in design of DPA-resistant cryptographic hardware
Cryptographic embedded systems are vulnerable to Differential Power Analysis (DPA) attacks. In this paper, we propose a logic design style, called as Precharge Masked Reed-Muller ...
Kuan Jen Lin, Shan Chien Fang, Shih Hsien Yang, Ch...