Sciweavers

109 search results - page 5 / 22
» csi 2008
Sort
View
CSI
2007
96views more  CSI 2007»
13 years 7 months ago
A common criteria based security requirements engineering process for the development of secure information systems
In order to develop security critical Information Systems, specifying security quality requirements is vitally important, although it is a very difficult task. Fortunately, there ...
Daniel Mellado, Eduardo Fernández-Medina, M...
CSI
2007
91views more  CSI 2007»
13 years 7 months ago
Implementing regular cash with blind fixed-value electronic coins
We propose a generic framework for the development of an off-line peer-to-peer electronic payment system with fixed-value electronic coins. The proposed scheme simulates the issua...
Dimitrios Lekkas, Diomidis Spinellis
CSI
2004
353views more  CSI 2004»
13 years 7 months ago
Design and implementation of a mobile database for Java phones
Due to the popularity of electronic commerce and the maturity of wireless technology, mobile users can access the Internet anytime anywhere without having to physically hook up an...
Eric Jui-Lin Lu, Yung-Yuan Cheng
CSI
2004
178views more  CSI 2004»
13 years 7 months ago
A flexible biometrics remote user authentication scheme
Recently, Lee, Ryu and Yoo proposed a fingerprint-based remote user authentication scheme by using smart cards and biometrics. Their scheme is based on two tiers of ElGamal's...
Chu-Hsing Lin, Yi-Yi Lai
CISS
2008
IEEE
14 years 1 months ago
Diversity-multiplexing tradeoff for the multiple-antenna wire-tap channel
In this paper the fading multiple antenna (MIMO) wire-tap channel is investigated under short term power constraints. The secret diversity gain and the secret multiplexing gain ar...
Melda Yuksel, Elza Erkip