Sciweavers

60 search results - page 2 / 12
» Cellular Programming and Symmetric Key Cryptography Systems
Sort
View
FC
2000
Springer
83views Cryptology» more  FC 2000»
13 years 9 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman
NETWORKING
2007
13 years 6 months ago
Privacy-Aware Multi-Context RFID Infrastructure Using Public Key Cryptography
We propose a novel approach in designing an RFID infrastructure which foresees the usage of a single RFID tag within different contexts and for multiple purposes. We regard privacy...
Selim Volkan Kaya, Erkay Savas, Albert Levi, Ö...
IJNSEC
2010
163views more  IJNSEC 2010»
13 years 7 days ago
Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types
As the importance and the value of exchanged data over the Internet or other media types are increasing, the search for the best solution to offer the necessary protection against...
Diaa Salama Abdul Minaam, Hatem M. Abdual-Kader, M...
SIMULATION
2002
103views more  SIMULATION 2002»
13 years 5 months ago
The Trend Cellular Automata Programming Environment
Trend is a two dimensional cellular automata programming environment with an integrated simulator and a compiler. Trend has many unique features such as simulation backtracking, c...
Hui-Hsien Chou, Wei Huang, James A. Reggia
ISW
2009
Springer
13 years 12 months ago
Towards Security Notions for White-Box Cryptography
Abstract. While code obfuscation attempts to hide certain characteristics of a program independently of an application, white-box cryptography (WBC) specifically focuses on softwa...
Amitabh Saxena, Brecht Wyseur, Bart Preneel