scispace - formally typeset
Search or ask a question

Showing papers in "Computer Standards & Interfaces in 2010"


Journal ArticleDOI
TL;DR: It is shown that the improved smart card authentication scheme proposed by Xu-Zhu-Feng is vulnerable to internal and impersonation attacks, and an improvement of their solution is proposed, and a new efficient strong smart card Authentication protocol is presented.

290 citations


Journal ArticleDOI
TL;DR: Simulation results demonstrate that the embedded watermarks can be almost fully extracted from images compressed with very high compression ratio.

207 citations


Journal ArticleDOI
TL;DR: This paper carries out a systematic review of the existing literature concerning security requirements engineering in order to summarize the evidence regarding this issue and to provide a framework/background in which to appropriately position new research activities.

186 citations


Journal ArticleDOI
TL;DR: A global comparison has been done for the most relevant models against these conditions, and an interface proposal for trust and/or reputation models has been proposed, providing some pre-standardization recommendations.

148 citations


Journal ArticleDOI
TL;DR: The proposed HPKI has delegated the trust and security management to the medical service provider during the contract period, which is more realistic and much an analogy to existing paper based health care systems in terms of functional structure.

114 citations


Journal ArticleDOI
TL;DR: A notation that allows business users to model their business process and must be agile, easy to learn and design, and capable to provide semantic information about the process is presented.

57 citations


Journal ArticleDOI
TL;DR: The K-response model is experimented for the 1-response scenario and its experimental results proved that the preceding host will get the response with in the time out period of the clone.

55 citations


Journal ArticleDOI
TL;DR: There is a great need for low cost systems that can detect human veins with minimum computational requirements and to achieve low scanning errors the acquired image should be almost noiseless and the algorithms should detect the vein pattern in various conditions.

47 citations


Journal ArticleDOI
TL;DR: This paper tries to find the optimal video codecs from energy analyses of them on handheld devices by investigating the effects from choices of codecs, file formats, and codec parameters.

33 citations


Journal ArticleDOI
TL;DR: The inspiration of a conceptual model capable to originate an effective, scalable e-Government ontology is presented and the implementation of an ontology-based repository for designing, modelling and even reengineering of governmental services is implemented in the Greek Government.

30 citations


Journal ArticleDOI
TL;DR: An Aspect-Oriented Programming-based approach to the development of software components for fault detection in automatic measurement systems is proposed, and results of software modularity and performance measurements for comparing aspect- and object-oriented solutions in rotating coils tests on superconducting magnets are reported.

Journal ArticleDOI
TL;DR: The RMS bias caused by window sidelobes when applying twelve different generalized cosine windows is compared and the presented principle is applicable for all DFT based algorithms, not only for those used for RMS value estimation.

Journal ArticleDOI
TL;DR: This work proposes a consensus problem based solution to make all sensors reach an agreement without the sink, which can conduct actions more quickly and directly.

Journal ArticleDOI
TL;DR: This paper proposes ADOPT (Ad hoc Distributed OCSP for Trust), a certificate validation protocol which can be successfully applied in MANETs but also in mobile and wireless networks.

Journal ArticleDOI
TL;DR: A framework based on an agreement contains a privacy model defined in the policy level of the agreement and provides upon it a reasoning mechanism for the evolution of the policies.

Journal ArticleDOI
TL;DR: This paper presents a methodology with which to audit personal data protection, using Requirements Engineering and based on CobiT, and has been validated in four real case studies.

Journal ArticleDOI
TL;DR: In this paper deficiencies identified by the authors during the implementation of a compiler, compliant with the second version of the IEC 61131-3 standard, are explained and analysed.

Journal ArticleDOI
TL;DR: An XML-based framework, called XLIVE, which provides an efficient way to collect data in live forensic cases, according to well-known crime categories, which will be used extensively to deal with terabyte/petabyte digital systems.

Journal ArticleDOI
TL;DR: A critical analysis of the on-going work standardizing low-latency EAP re-authentication and key distribution protocols for secure and seamless handover in mobile scenarios is provided.

Journal ArticleDOI
TL;DR: This paper mounts the first impossible differential attack on 7-round Crypton using two new observations on the diffusion layer of Crypton, exploiting a 4-round impossible differential, and appropriately choosing three additional rounds.

Journal ArticleDOI
TL;DR: A new class of auxetic materials, a hexachiral honeycomb structure with good mechanical properties, is investigated through computer simulation and measurement and promises better performance using different insertion techniques.

Journal ArticleDOI
TL;DR: The adoption of TDR for granular materials monitoring is investigated, and an in-depth analysis is extended to various feedstuff materials, confirming its suitability for the considered applications.

Journal ArticleDOI
TL;DR: Various implementations of the e-cognocracy technology are presented, starting with an initial proof of concept and going on to the use of smart cards to permit remote use of the system and influence the level of perceived confidence among users, eliminating the role of one of the confidence authorities formerly required to ensure appropriate system security.

Journal ArticleDOI
TL;DR: In this article, the authors proposed an efficient scheme for issuing receipts to voters in an e-voting environment using the well-known divide-and-choose method, which requires neither special printers or scanners, nor frequent observations of voting machines.

Journal ArticleDOI
TL;DR: A framework for tools to support the development of NDR for XML Schema is described, which aid in producing high quality XML schemas using a standards-based approach to information integration.

Journal ArticleDOI
TL;DR: The proposed method is intended to test the linearity of the ADC in the static regime, using only constant test signals, except for a small amount of additive noise, in a nearly optimal manner.

Journal ArticleDOI
TL;DR: The security framework that is to be developed for the generic grid platform created for the project GREDIA, which uses the OGSA standards, will follow GSI, the portion of Globus that implements security.

Journal ArticleDOI
TL;DR: It is proved that an important quality factor in providing relevant information is how frequent Internet search services refresh their databases and when users' browsing behavior is jointly examined with the ability of the Internet search Services to offer new and fresh results, a more effective meta-search is provided.

Journal ArticleDOI
TL;DR: This paper presents the test aspect of URN, the part of ITU-T's family of languages that describes functional requirements and high level designs with causal scenarios.

Journal ArticleDOI
TL;DR: It is indicated that COM+ falls short of supporting even Core RBAC, and an algorithm is suggested that formally specifies the semantics of authorization decisions in COM+.