Sciweavers

400 search results - page 3 / 80
» RFID Security: Tradeoffs between Security and Efficiency
Sort
View
IWRT
2008
109views Communications» more  IWRT 2008»
13 years 6 months ago
Classification of RFID Attacks
RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Altho...
Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew ...
CIKM
2006
Springer
13 years 9 months ago
Secure search in enterprise webs: tradeoffs in efficient implementation for document level security
Document level security (DLS)
Peter Bailey, David Hawking, Brett Matson
ESORICS
2009
Springer
14 years 5 months ago
Secure Ownership and Ownership Transfer in RFID Systems
We present a formal model for stateful security protocols. This model is used to define ownership and ownership transfer as concepts as well as security properties. These definitio...
Ton van Deursen, Sjouke Mauw, Sasa Radomirovic, Pi...
ICFEM
2009
Springer
13 years 3 months ago
Improving Automatic Verification of Security Protocols with XOR
Abstract. K
Xihui Chen, Ton van Deursen, Jun Pang
INTERACT
2007
13 years 6 months ago
Designing a Trade-Off Between Usability and Security: A Metrics Based-Model
The design of usable yet secure systems raises crucial questions when it comes to balancing properly security and usability. Finding the right tradeoff between these two quality at...
Christina Braz, Ahmed Seffah, David M'Raïhi