Sciweavers

8 search results - page 1 / 2
» jcs 2011
Sort
View
JCS
2011
55views more  JCS 2011»
12 years 11 months ago
Tree-based HB protocols for privacy-preserving authentication of RFID tags
Tzipora Halevi, Nitesh Saxena, Shai Halevi
JCS
2011
126views more  JCS 2011»
12 years 11 months ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
L. H. Nguyen, A. W. Roscoe
JCS
2011
72views more  JCS 2011»
12 years 11 months ago
Automatically deriving information-theoretic bounds for adaptive side-channel attacks
We present a model of adaptive attacks which we combine with information-theoretic metrics to quantify the information revealed to an adaptive adversary. This enables us to expres...
Boris Köpf, David A. Basin
JCS
2011
74views more  JCS 2011»
12 years 11 months ago
Model-checking trace-based information flow properties
In this paper we consider the problem of verifying trace-based information flow properties for different classes of system models. We begin by proposing an automata-theoretic te...
Deepak D'Souza, Raveendra Holla, K. R. Raghavendra...
JCS
2011
87views more  JCS 2011»
12 years 11 months ago
Practical eavesdropping and skimming attacks on high-frequency RFID tokens
RFID systems often use near-field magnetic coupling to implement communication channels. The advertised operational range of these channels is less than 10 cm and therefore sever...
Gerhard P. Hancke