Sciweavers

127 search results - page 4 / 26
» Using Smartcards to Secure a Personalized Gambling Device
Sort
View
CHES
2006
Springer
133views Cryptology» more  CHES 2006»
13 years 9 months ago
Fast Generation of Prime Numbers on Portable Devices: An Update
The generation of prime numbers underlies the use of most public-key cryptosystems, essentially as a primitive needed for the creation of RSA key pairs. Surprisingly enough, despit...
Marc Joye, Pascal Paillier
FC
2007
Springer
117views Cryptology» more  FC 2007»
13 years 12 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
PET
2004
Springer
13 years 11 months ago
Secure Outsourcing of Sequence Comparisons
Internet computing technologies, like grid computing, enable a weak computational device connected to such a grid to be less limited by its inadequate local computational, storage,...
Mikhail J. Atallah, Jiangtao Li
ISMVL
2010
IEEE
209views Hardware» more  ISMVL 2010»
13 years 10 months ago
Secure Design Flow for Asynchronous Multi-valued Logic Circuits
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
Ashur Rafiev, Julian P. Murphy, Alexandre Yakovlev
PDC
2006
ACM
13 years 11 months ago
Make it so! Jean-Luc Picard, Bart Simpson and the design of e-public services
In this paper, we report on a project applying participatory design methods to include people who have experience of social exclusion (in one form or another) in designing possibl...
Andy Dearden, Angela Lauener, Frances Slack, Chris...