Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
NORDSEC
2009
Springer
11 years 6 months ago
Security Usability of Petname Systems
Abstract. To have certainty about identities is crucial for secure communication in digital environments. The number of digital identities that people and organizations need to man...
Md. Sadek Ferdous, Audun Jøsang, Kuldeep Si...
NORDSEC
2009
Springer
11 years 6 months ago
Security and Trust for the Norwegian E-Voting Pilot Project E-valg 2011
Early 2009, the Norwegian Ministry of Local Government and Regional Development (KRD) decided to start a procurement procedure for E-valg 2011, an e-voting pilot project for the mu...
Arne Ansper, Sven Heiberg, Helger Lipmaa, Tom Andr...
NORDSEC
2009
Springer
11 years 6 months ago
Formal Analysis of the Estonian Mobile-ID Protocol
In this paper, we report the results of the formal analysis performed on the Estonian Mobile-ID protocol (deployed since 2008), allowing citizens and permanent residents of Estonia...
Peeter Laud, Meelis Roos
NORDSEC
2009
Springer
11 years 6 months ago
ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System
In this paper we introduce ContikiSec, a secure network layer for wireless sensor networks, designed for the Contiki Operating System. ContikiSec has a configurable design, providi...
Lander Casado, Philippas Tsigas
NORDSEC
2009
Springer
11 years 8 months ago
Towards True Random Number Generation in Mobile Environments
In our paper, we analyze possibilities to generate true random data in mobile devices such as mobile phones or pocket computers. We show how to extract arguably true random data w...
Jan Bouda, Jan Krhovjak, Vashek Matyas, Petr Svend...
NORDSEC
2009
Springer
11 years 8 months ago
Blunting Differential Attacks on PIN Processing APIs
Riccardo Focardi, Flaminia L. Luccio, Graham Steel
NORDSEC
2009
Springer
11 years 8 months ago
A Parallelism-Based Approach to Network Anonymization
Considering topologies of anonymous networks we used to organizing anonymous communications into hard to trace paths, composed of several middleman nodes, towards hiding communicat...
Igor Margasinski
NORDSEC
2009
Springer
11 years 8 months ago
Facilitating the Adoption of Tor by Focusing on a Promising Target Group
The technology for anonymous communication has been thoroughly researched. But despite the existence of several protection services, a business model for anonymous web surfing has ...
Heiko Roßnagel, Jan Zibuschka, Lexi Pimenidi...
NORDSEC
2009
Springer
11 years 8 months ago
Towards Practical Enforcement Theories
Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints speciļ¬ed by a security policy. It is based on two simple ideas: the enforceme...
Nataliia Bielova, Fabio Massacci, Andrea Michelett...
books