Sciweavers

86 search results - page 2 / 18
» Analysis and Optimization of Cryptographically Generated Add...
Sort
View
IFIP
2009
Springer
14 years 9 days ago
Trusted Multiplexing of Cryptographic Protocols
Abstract. We present an analysis that determines when it is possible to multiplex a pair of cryptographic protocols. We present a transformation that improves the coverage of this ...
Jay A. McCarthy, Shriram Krishnamurthi
ACL2
2006
ACM
13 years 11 months ago
A verifying core for a cryptographic language compiler
A verifying compiler is one that emits both object code and a proof of correspondence between object and source code.1 We report the use of ACL2 in building a verifying compiler f...
Lee Pike, Mark Shields, John Matthews
WSC
1998
13 years 7 months ago
Integrated Modeling and Analysis Generator Environment (IMAGE): A Decision Support Tool
A truly integrated modeling and analysis environment, which facilitates multi-use and multi-tool models, is necessary for today's enterprises to meet the challenges of the co...
Dursun Delen, Perakath C. Benjamin, Madhav Erragun...
PERVASIVE
2007
Springer
13 years 12 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen
ADHOCNOW
2009
Springer
13 years 6 months ago
Secure EPC Gen2 Compliant Radio Frequency Identification
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard a de facto specification for inexpensive tags in the RFID industry. Recently three EPCGen2 complian...
Mike Burmester, Breno de Medeiros, Jorge Munilla, ...