Sciweavers

IEEESP
2006
52views more  IEEESP 2006»
13 years 11 months ago
Lessons for laptops from the 18th century
Roland L. Trope, E. Michael Power
IEEESP
2006
130views more  IEEESP 2006»
13 years 11 months ago
Securing Embedded Systems
t a single security abstraction layer, but rather is a roblem spanning multiple abstraction levels. We use an embedded biometric authentication device to demonstratethenecessityofa...
David Hwang, Patrick Schaumont, Kris Tiri, Ingrid ...
IEEESP
2006
62views more  IEEESP 2006»
13 years 11 months ago
Case Study: Online Banking Security
Kjell Jørgen Hole, Vebjørn Moen, Tho...
IEEESP
2006
68views more  IEEESP 2006»
13 years 11 months ago
Secure Internet Banking Authentication
Alain P. Hiltgen, Thorsten Kramp, Thomas Weigold
IEEESP
2006
47views more  IEEESP 2006»
13 years 11 months ago
Randomness in Cryptography
Rosario Gennaro
IEEESP
2006
72views more  IEEESP 2006»
13 years 11 months ago
Challenges in Securing the Domain Name System
Ramaswamy Chandramouli, Scott Rose
IEEESP
2006
66views more  IEEESP 2006»
13 years 11 months ago
The End of End-to-End Security?
Scott Bradner