Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,360,379 papers from all fields of science
Search
Sign In
Create Free Account
Transaction verification
Transaction verification is the generic term to describe the Internet-based security method of verifying that the actual content of a transaction has…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Internet security
Man-in-the-browser
PassWindow
Transaction authentication
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Robust Multiparty Computation with Faster Verification Time
Souradyuti Paul
,
Ananya Shrivastava
Australasian Conference on Information Security…
2018
Corpus ID: 49646380
In Eurocrypt 2016, Kiayias, Zhou and Zikas (KZZ) have designed a multiparty protocol for computing an arbitrary function, which…
Expand
2015
2015
Location Aware Selective Unlocking forEnhancing RFID Security
S. Dakhore
,
P. Lohiya
2015
Corpus ID: 37994431
In this paper, a new approach for providing security as well as privacy is proposed. The un-authorized reading and relay attacks…
Expand
2015
2015
Assertion based verification of SGMII IP core incorporating AXI Transaction Verification Model
Rini Sebastian
,
Silpa Rose Mary
,
M. Gayathri
,
Anoop Thomas
International Conference on Innovative Computing…
2015
Corpus ID: 16090695
In the era of System-on-Chips (SoCs), verification complexity is clearly due to the logical and functional anomalies in the…
Expand
2014
2014
Containing sybil attacks on trust management schemes for peer-to-peer networks
L. Cai
,
R. Rojas-Cessa
IEEE International Conference on Communications…
2014
Corpus ID: 12692762
In this paper, we introduce a framework to detect possible sybil attacks against a trust management scheme of peer-to-peer (P2P…
Expand
2008
2008
Enhanced Security for Preventing Man-in-the Middle Attacks in Authentication, Data Entry and Transaction Verification
Jason G. Wells
,
D. Hutchinson
,
J. D. Pierce
2008
Corpus ID: 8528982
There is increasing coverage in the literature highlighting threats to online financial systems. Attacks range from the prevalent…
Expand
2006
2006
The Use of UML Sequence Diagram for System-on-Chip System Level Transaction-based Functional Verification
Jinshan Yu
,
Tun Li
,
QingPing Tan
World Congress on Intelligent Control and…
2006
Corpus ID: 14323258
An important problem faced by system-on-chip transaction-based verification is how to design the complex transaction test…
Expand
2002
2002
SOC Bus Transaction Verification Using AMBA Protocol Checker
Kab Joo Lee
,
S. Kim
,
Hyo Seon Hwang
2002
Corpus ID: 60141859
This paper presents an ARM-based SOC bus transaction verification IP and the usage experiences in SOC designs. The verification…
Expand
1998
1998
An Engineering Approach to Atomic Transaction Verification : Use of a Simple Object Model to Achieve Semantics-based Reasoning at Compile-time
D. Spelt
,
S. Even
1998
Corpus ID: 10712656
In this paper, we take an engineering approach to atomic transaction verification. We discuss the design and implementation of a…
Expand
1995
1995
Specification and Implementation of Consistency Constraints in Object-Oriented Database Systems: Applying Programming-by-Contract
A. Geppert
,
K. Dittrich
Datenbanksysteme für Business, Technologie und…
1995
Corpus ID: 6200525
We describe an approach to the specification and implementation of consistency constraints in object-oriented database systems…
Expand
Review
1991
Review
1991
Electronic data interchange
S. Castell
Computer Law and Security Review
1991
Corpus ID: 62718222
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE