Sciweavers

43 search results - page 1 / 9
» Object-Swapping for Resource-Constrained Devices
Sort
View
ICDCSW
2007
IEEE
13 years 10 months ago
Object-Swapping for Resource-Constrained Devices
Mobile devices are still memory-constrained when compared to desktop and laptop computers. Thus, in some circumstances, even while occupied by useful objects, some memory must be ...
Luís Veiga, Paulo Ferreira
IJNSEC
2007
110views more  IJNSEC 2007»
13 years 4 months ago
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse...
Chetan Nanjunda Mathur, K. P. Subbalakshmi
AINA
2007
IEEE
13 years 8 months ago
pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices
PKI is generally considered as the most appropriate solution for e-commerce and mutual authentication, owing to its digital signature and non-repudiation features. Asymmetric key ...
Ki-Woong Park, Hyunchul Seok, Kyu Ho Park
FC
2010
Springer
166views Cryptology» more  FC 2010»
13 years 5 months ago
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices
Daniel Engels, Xinxin Fan, Guang Gong, Honggang Hu...
IJNSEC
2006
80views more  IJNSEC 2006»
13 years 4 months ago
Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices
Side channel analysis is a technique that enables the adversary to benefit from information leakages occurring due to the implementation of encryption algorithms on
Dimitrios L. Delivasilis, Sokratis K. Katsikas