Showing 1 - 10 of 77
Since RFID tags are ubiquitous and at times even oblivious to thehuman user, all modern RFID protocols are designed to resist tracking so that thelocation privacy of the human RFID user is not violated. Another design criterionfor RFIDs is the low computational effort required for tags, in view...
Persistent link: https://www.econbiz.de/10009461313
This article presents multi-output, multi-input total factor productivity (TFP) growth rates in agriculture for 88 countries over the 1970–2001 period, estimated with both stochastic frontier analysis (SFA) and the more commonly employed data envelopment analysis (DEA). We find results with...
Persistent link: https://www.econbiz.de/10009448484
The emergence of the Internet has led to an explosion of web applications. The World Wide Web (www) has a huge and permanent influence on our lives. Economy, industry, education, health, public administration are components of our lives that have not been penetrated by the World Wide Web. The...
Persistent link: https://www.econbiz.de/10015336104
of an encryption-based service architecture in an untrusted two-party environment We analyze the foundations of trust in …. For these cases, we derive a new privacy-preserving architecture that is based on an adapted homomorphic encryption …
Persistent link: https://www.econbiz.de/10009467121
organization’s point of view. Finally, there is a review of encryption systems, there types, differences and measures. …
Persistent link: https://www.econbiz.de/10009478729
Encryption is used to convert an email message to an unreadable format thereby securing patient privacy during the … transmission of the message across the Internet. Two available means of encryption are: public key infrastructure (PKI) used in … encryption technology: correspondent's risk perception, correspondent's identification to the security afforded by encryption …
Persistent link: https://www.econbiz.de/10009448423
privacy risk. Encryption of the email message is used to mitigate the risk. Two means of encryption were investigated: public … an email-based service were identified by a number of means including: technical assessment of encryption models … regardless of whether the communication was encrypted or not. Indicating correspondents are unlikely to comply with encryption …
Persistent link: https://www.econbiz.de/10009448597
Current trends indicate that IT security measures will need to greatly expand to counter the ever increasingly sophisticated, well-funded and/or economically motivated threat space. Traditional risk management approaches provide an effective method for guiding courses of action for assessment,...
Persistent link: https://www.econbiz.de/10009435963
Diese Arbeit betrachtet zwei anspruchsvolle Probleme aus dem Bereich Computer- und Kommunikationssicherheit und Vertrauen. Beim Datenbank-Serviceprovider-Problem moechte ein Anwender seine Datenbank an einen Datenbank-Serviceprovider (DSP) uebergeben, damit dieser sie betreiben und ihm zur...
Persistent link: https://www.econbiz.de/10009467070
RFID introduction is a hotly debated public policy issue. The technology enables physical environments to become more interactive and supportive by tagging each item with a chip that wirelessly communicates with a service-enriched backend infrastructure. Based on a number of user studies at...
Persistent link: https://www.econbiz.de/10009467176