Sciweavers

18 search results - page 1 / 4
» Yet Another Sieving Device
Sort
View
CTRSA
2004
Springer
59views Cryptology» more  CTRSA 2004»
13 years 10 months ago
Yet Another Sieving Device
Abstract. A compact mesh architecture for supporting the relation collection step of the number field sieve is described. Differing from TWIRL, only isolated chips without inter-...
Willi Geiselmann, Rainer Steinwandt
ACISP
2003
Springer
13 years 10 months ago
Robust Software Tokens - Yet Another Method for Securing User's Digital Identity
Abstract. This paper presents a robust software token that was developed to protect user’s digital identity by simple software-only techniques. This work is closely related to Ho...
Taekyoung Kwon
SECRYPT
2008
107views Business» more  SECRYPT 2008»
13 years 6 months ago
Yet Another Secure Distance-Bounding Protocol
Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has been introduced fiftee...
Ventzislav Nikov, Marc Vauclair
SPW
2004
Springer
13 years 10 months ago
One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA
How can we design a PDA that is at the same time secure and usable? In current implementations the two properties are mutually exclusive. Because normal users find password entry ...
Frank Stajano
MOBIQUITOUS
2007
IEEE
13 years 11 months ago
Key Establishment Using Secure Distance Bounding Protocols
Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional security mechanisms often do not cope with the dynamic characteristics of wirel...
Dave Singelée, Bart Preneel