Zobrazeno 1 - 10
of 29
pro vyhledávání: '"Ana I. González-Tablas"'
Publikováno v:
Mathematics, Vol 8, Iss 11, p 1993 (2020)
Cryptography is the mathematical core of information security. It serves both as a source of hard computational problems and as precise language allowing for the formalization of sound security models. While dealing with the mathematical foundations
Externí odkaz:
https://doaj.org/article/55d9c4de328c4ceaa101ee0283a239f9
Publikováno v:
Sensors, Vol 16, Iss 5, p 674 (2016)
We address the problem of bootstrapping security and privacy policies for newly-deployed apps in wireless body area networks (WBAN) composed of smartphones, sensors and other wearable devices. We introduce a framework to model such a WBAN as an undir
Externí odkaz:
https://doaj.org/article/54ab74548e3b491c9613e1697e04d825
Publikováno v:
SIGCSE
We present an active learning experience conducted on a Cryptography course within a Bachelor's Degree in Computer Science and Engineering with the goal of promoting better attitudes towards cryptography. Students were asked to create short videos th
Publikováno v:
Mathematics
Volume 8
Issue 11
Mathematics, Vol 8, Iss 1993, p 1993 (2020)
Volume 8
Issue 11
Mathematics, Vol 8, Iss 1993, p 1993 (2020)
Cryptography is the mathematical core of information security. It serves both as a source of hard computational problems and as precise language allowing for the formalization of sound security models. While dealing with the mathematical foundations
Publikováno v:
Computers & Security. 43:159-187
In the era of hyper-connectivity Web-Based Social Networks (WBSNs) are demanding applications. They facilitate the interaction of huge amounts of users and the development of appropriate Access Control Models (ACMs) is an arising necessity. Particula
Publikováno v:
Journal of Systems Architecture. 59:985-995
There are traffic situations (e.g. incorrect speeding tickets) in which a given vehicle's driving behavior at some point in time has to be proved to a third party. Vehicle-mounted sensorial devices are not suitable for this matter since they can be m
Publikováno v:
e-Archivo. Repositorio Institucional de la Universidad Carlos III de Madrid
instname
instname
Nowadays, improving road safety is one of the major challenges in developed countries and, to this regard, attaining more effectiveness in the enforcement of road safety policies has become a key target. In particular, enforcing the requirements rela
Publikováno v:
Computers & Security. 34:67-112
Non-repudiation is a desired property of current electronic transactions, by which a further repudiation of the commitments made by any involved party is prevented. Digital signatures are recognized by current standards and legislation as non-repudia
Publikováno v:
Transportation Research Part C: Emerging Technologies. 23:85-97
Solutions for a secure data dissemination in Vehicular Ad-hoc Networks (VANETs) are increasingly adopting robust cryptography schemes as more lightweight, trust-based approaches often lead to serious problems such as illusion, collusion and sybil att
Publikováno v:
Computers & Security. 27:309-322
The growth of the e-commerce has allowed companies and individuals to sell and purchase almost any kind of product and service through the Internet. However, during the purchase transaction there is a moment during which the seller has sensitive info