Filters








28 Hits in 12.4 sec

Trust Management on the World Wide Web (originally published in June 1998)

Rohit Khare, Adam Rifkin
2006 First Monday  
Secure Coprocessors in Electronic Commerce Applications, Proceedings of The First USENIX Workshop on Electronic Commerce, New York, N.Y., July 1995; available at http://www-cse.ucsd.edu/users/bsy/papers.html  ...  Resnick and Miller, 1996. 11. Chu et al., 1997. 12. Blaze et al., 1997. 13. Presler-Marshall et al., 1997. 14. DesAutels et al., 1997. 15. Cox, 1996. 16. Yee and Tygar, 1995. 17.  ... 
doi:10.5210/fm.v0i0.1589 fatcat:xcoc5f6aazgcnbhexyngd3x6fm

Field Programmable Gate Array Applications—A Scientometric Review

Juan Ruiz-Rosero, Gustavo Ramirez-Gonzalez, Rahul Khanna
2019 Computation  
These publications show the vast range of applications based on FPGAs, from the new mechanism that enables the magnetic suspension system for the kilogram redefinition, to the Mars rovers' navigation systems  ...  Programmable Gate Array (FPGA) is a general purpose programmable logic device that can be configured by a customer after manufacturing to perform from a simple logic gate operations to complex systems on  ...  USA, 12-15 July 2007.209.  ... 
doi:10.3390/computation7040063 fatcat:wxtatzsvvnfopghdfl25hcfc2a

A survey of static analysis methods for identifying security vulnerabilities in software systems

M. Pistoia, S. Chandra, S. J. Fink, E. Yahav
2007 IBM Systems Journal  
, New York, NY, USA, ACM Press (2004), pp. 132-136.  ...  5, 83-94, New York: ACM Press (June 17-19 2002).  ... 
doi:10.1147/sj.462.0265 fatcat:ykcfy2vgdzgllnxprlyyiieaia

Introduction to the IEEE Transactions on Cloud Computing

Rajkumar Buyya
2013 IEEE Transactions on Cloud Computing  
For more information on his group's research, please visit the Worldwide  ...  Watson Research Center in New York.  ...  He is an associate professor of computer science and engineering at the State University of New York at Buffalo.  ... 
doi:10.1109/tcc.2013.13 fatcat:j7z2ihzdhfbgnc2ilfhhw4deqe

A Trustworthy Electronic Voting System for Australian Federal Elections [article]

Mark Eldridge
2018 arXiv   pre-print
This thesis explores the design of electronic voting systems designed to achieve these same goals, while also improving on the existing system in the areas of counting speed, accuracy, tamper resistance  ...  Electronic voting systems have seen limited use within Australian elections, most prominently for State Elections in Victoria (2014), New South Wales (2015) and Western Australia (2017), along with trials  ...  In Proceedings of the 2005 Workshop on Issues in the Theory of Security, WITS ’05, pages 81–88, New York, NY, USA, 2005. ACM. URL: http://doi.acm.  ... 
arXiv:1805.02202v1 fatcat:mqmsx7e6qjasletdjm75uvz5we

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1994 Software engineering notes  
(R 18 58); history -note on Bletchley Park Colossus breaking Fish ciphers (R 18 59); practical tampering attacks, Ross Anderson and Markus Kuhn, Usenix Electronic Commerce paper (R 18 62); more from  ...  dfeiSPHh NSF workshop on feasibility of e-voting, commentary by Avi Rubin and others (S 26 1:16-17, R 21 10-11) Sf House Science Committee hearings on electronic and other voting systems, 22 May 2001  ...  prank letter (S 13 1) $f Democratic National Committee thank-you mailing mistitled supporters (The New York Times, 16 Dec 1984) f British NHS computer sent out letters to males with female names (S 12  ... 
doi:10.1145/181610.181612 fatcat:qfzxpio6tfgl5nmbevta334afi

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1992 Software engineering notes  
(R 18 58); history -note on Bletchley Park Colossus breaking Fish ciphers (R 18 59); practical tampering attacks, Ross Anderson and Markus Kuhn, Usenix Electronic Commerce paper (R 18 62); more from  ...  dfeiSPHh NSF workshop on feasibility of e-voting, commentary by Avi Rubin and others (S 26 1:16-17, R 21 10-11) Sf House Science Committee hearings on electronic and other voting systems, 22 May 2001  ...  prank letter (S 13 1) $f Democratic National Committee thank-you mailing mistitled supporters (The New York Times, 16 Dec 1984) f British NHS computer sent out letters to males with female names (S 12  ... 
doi:10.1145/134292.134293 fatcat:ayrwcbvvljhrdeav5kvrxaycs4

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1996 Software engineering notes  
(R 18 58); history -note on Bletchley Park Colossus breaking Fish ciphers (R 18 59); practical tampering attacks, Ross Anderson and Markus Kuhn, Usenix Electronic Commerce paper (R 18 62); more from  ...  dfeiSPHh NSF workshop on feasibility of e-voting, commentary by Avi Rubin and others (S 26 1:16-17, R 21 10-11) Sf House Science Committee hearings on electronic and other voting systems, 22 May 2001  ...  prank letter (S 13 1) $f Democratic National Committee thank-you mailing mistitled supporters (The New York Times, 16 Dec 1984) f British NHS computer sent out letters to males with female names (S 12  ... 
doi:10.1145/381790.381797 fatcat:kcxte3luzrg57ms3gwwbqzs5ji

Reliability of Chip & PIN evidence in banking disputes

Steven J. Murdoch
2014 Digital Evidence and Electronic Signature Law Review  
Murdoch, Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks, Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium (2007, USENIX Association Berkeley, CA, USA  ...  (When Cryptographically Secured Data is Not Secure), Workshop on Cryptographic Algorithms and their Uses, July 2004, (Queensland University of Technology), http://www. cl.cam.ac.uk/˜mkb23/research/Enc-Rand-Comp.pdf  ... 
doi:10.14296/deeslr.v6i0.1862 fatcat:w47qfazacnhjxg6mhradptps4u

Legal Framework And Requirements Of Automotive On-Board Networks (Evita Deliverable 2.4)

Jos Dumortier, Christophe Geuens, Alastair Ruddle, Lester Low, Michael Friedewald
2011 Zenodo  
Thus, EVITA will provide a basis for the secure deployment of electronic safety applications based on vehicleto-vehicle and vehicle-to-infrastructure communication.  ...  This document provides guidance on legal issues related to privacy and liability encountered within the scope of automotive onboard networks. iii  ...  Preneel, PriPAYD: Privacy Friendly Pay-As-You-Drive Insurance, In Workshop on Privacy in the Electronic Society 2007, in Proceedings of the 2007 ACM workshop on Privacy in Electronic Society, Alexandria  ... 
doi:10.5281/zenodo.1188420 fatcat:y2mmniws5bak3mugmzubmlssjy

Bandwidth is Political: Reachability in the Public Internet

Nancy E. Paterson
2009 Social Science Research Network  
The first of these events, a workshop on commercialization and privatization, took place in March of 1990 and was co-sponsored by the NSF.  ...  And in an unusual move for a state government, New York State has established Net Neutrality as a telecommunications standard within its jurisdiction (New York Department of State, 2009).  ...  One prefix, one origin AS 8 8. I G P i s s u e s 8 9. AS Space exhaustion 8 10. Reserved AS Numbers 9 11. Security Considerations 9 12. Acknowledgments 9 13 R e f e r e n c e s 9 14.  ... 
doi:10.2139/ssrn.2355762 fatcat:ydxrj6kzvveq7dvqa36cpetkei

إبرام العقود الذکية عبر تقنية البلوک تشين

هيثم السيد أحمد عيسي
2021 مجلة الدراسات القانونیة والاقتصادیة  
for a long time in this regard; Because the agreement between the contracting parties appears in the form of a code that is run and executed by members of the Blockchain network or the nodes, without one  ...  general rules accommodate the specificities of their formation; and we divided our research into an introductory section entitled "the fundamentals of block chain technology", and two main sections; the first  ...  /Articles/2018/11/13/sp111418-winds-of-change-the-case-for-new-digitalcurrency. (17/12/2019). ‫  ... 
doi:10.21608/jdl.2021.207223 fatcat:ibihvfzlfbevpgbh5nqg6iucjq

Turkish Local e-Governments: a Longitudinal Study

Aykut Arslan
2007 The Electronic Journal of e-Government   unpublished
The first part of the study, which took place in 2005, indicated that only 969 authorities were online. But the second part, issued at the end of 2006, showed that 1,591 units were online.  ...  That's why this study is unique in terms of covering the overall picture of the local activity on the topic of e-government.  ...  I would also like to thank Paul 't Hart and Kutsal Yesilkagit for their comments on a previous version of this paper.  ... 
fatcat:xxaagoidyjdoveie6hecfgcm3i

Inform atica An International Journal of Computing and Informatics Simulation Modelling Methodology and Education O t~ I Oi i t

S-I
1997 Polurne   unpublished
Third Joint Conference on Knowledge-Based Software Engineering Smolenice, Slovakia, September 9-11, 1998 Informatica 21 (1997  ...  Commerce/EDI research group of the Athens University of Economics and Busi ness.  ...  IEEE, New York, USA. [8] Hollands, R. J. and Mort, N. (1995) Manufacturing systems simulation: mixed mode and virtual reality simulation.  ... 
fatcat:sk3xo32wengjljexw23a3ugv4a

Personalized information delivery

Peter W. Foltz, Susan T. Dumais
1992 Posters and short talks of the 1992 SIGCHI conference on Human factors in computing systems - CHI '92  
Sample application scenarios may be seen in news-or stock-tickers.  ...  The use of subscription technology in the context of contract negotiation in electronic business environments is discussed in the following article.  ...  In: Proceedings of the USENIX Technical Conference, (USENIX'95), 1995, pp. 177-186 execution time of the operators in case of new messages.  ... 
doi:10.1145/1125021.1125024 dblp:conf/chi/FoltzD92 fatcat:ddxdxdx35zazhcwut6tgnb53ru
« Previous Showing results 1 — 15 out of 28 results