Sciweavers

Share
8 search results - page 1 / 2
» jcs 2011
Sort
View
JCS
2011
55views more  JCS 2011»
8 years 3 months ago
Tree-based HB protocols for privacy-preserving authentication of RFID tags
Tzipora Halevi, Nitesh Saxena, Shai Halevi
JCS
2011
126views more  JCS 2011»
8 years 3 months ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
L. H. Nguyen, A. W. Roscoe
JCS
2011
72views more  JCS 2011»
8 years 3 months ago
Automatically deriving information-theoretic bounds for adaptive side-channel attacks
We present a model of adaptive attacks which we combine with information-theoretic metrics to quantify the information revealed to an adaptive adversary. This enables us to expres...
Boris Köpf, David A. Basin
JCS
2011
74views more  JCS 2011»
8 years 3 months ago
Model-checking trace-based information flow properties
In this paper we consider the problem of verifying trace-based information flow properties for different classes of system models. We begin by proposing an automata-theoretic te...
Deepak D'Souza, Raveendra Holla, K. R. Raghavendra...
JCS
2011
87views more  JCS 2011»
8 years 3 months ago
Practical eavesdropping and skimming attacks on high-frequency RFID tokens
RFID systems often use near-field magnetic coupling to implement communication channels. The advertised operational range of these channels is less than 10 cm and therefore sever...
Gerhard P. Hancke
books