Sciweavers

76 search results - page 2 / 16
» From Passive to Covert Security at Low Cost
Sort
View
CORR
2010
Springer
159views Education» more  CORR 2010»
13 years 5 months ago
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode tech...
Eslam Gamal Ahmed, Eman Shaaban, Mohamed Hashem
HOTI
2008
IEEE
14 years 6 days ago
Low Power Passive Equalizer Design for Computer Memory Links
Several types of low power passive equalizer is proposed and optimized in this work. The equalizer topologies include T-junction, parallel R-C and series R-L structures. These str...
Ling Zhang, Wenjian Yu, Yulei Zhang, Renshen Wang,...
ISM
2008
IEEE
111views Multimedia» more  ISM 2008»
14 years 4 days ago
Secure and Low Cost Selective Encryption for JPEG2000
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach ...
Ayoub Massoudi, Frédéric Lefè...
PKC
1999
Springer
102views Cryptology» more  PKC 1999»
13 years 10 months ago
How to Enhance the Security of Public-Key Encryption at Minimum Cost
This paper presents a simple and efficient conversion from a semantically secure public-key encryption scheme against passive adversaries to a non-malleable (or semantically secure...
Eiichiro Fujisaki, Tatsuaki Okamoto
CARDIS
2008
Springer
153views Hardware» more  CARDIS 2008»
13 years 7 months ago
Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents
In recent years more and more security sensitive applications use passive smart devices such as contactless smart cards and RFID tags. Cost constraints imply a small hardware footp...
Carsten Rolfes, Axel Poschmann, Gregor Leander, Ch...