Sciweavers

10 search results - page 2 / 2
» cardis 2006
Sort
View
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
13 years 8 months ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...
CARDIS
2006
Springer
114views Hardware» more  CARDIS 2006»
13 years 8 months ago
A Low-Footprint Java-to-Native Compilation Scheme Using Formal Methods
Ahead-of-Time and Just-in-Time compilation are common ways to improve runtime performances of restrained systems like Java Card by turning critical Java methods into native code. H...
Alexandre Courbot, Mariela Pavlova, Gilles Grimaud...
CARDIS
2006
Springer
146views Hardware» more  CARDIS 2006»
13 years 8 months ago
SEA: A Scalable Encryption Algorithm for Small Embedded Applications
Most present symmetric encryption algorithms result from a tradeoff between implementation cost and resulting performances. In addition, they generally aim to be implemented effici...
François-Xavier Standaert, Gilles Piret, Ne...
EMNLP
2006
13 years 6 months ago
Joint Extraction of Entities and Relations for Opinion Recognition
We present an approach for the joint extraction of entities and relations in the context of opinion recognition and analysis. We identify two types of opinion-related entities -- ...
Yejin Choi, Eric Breck, Claire Cardie
CARDIS
2006
Springer
159views Hardware» more  CARDIS 2006»
13 years 8 months ago
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Claude Castelluccia, Gildas Avoine