Sciweavers

WISTP
2007
Springer
13 years 10 months ago
Reverse Engineering Java Card Applets Using Power Analysis
Abstract. Power analysis on smart cards is widely used to obtain information about implemented cryptographic algorithms. We propose similar methodology for Java Card applets revers...
Dennis Vermoen, Marc F. Witteman, Georgi Gaydadjie...
WISTP
2007
Springer
13 years 10 months ago
Distributed Certified Information Access for Mobile Devices
Aniello Del Sorbo, Clemente Galdi, Giuseppe Persia...
WISTP
2007
Springer
13 years 10 months ago
Securing the Distribution and Storage of Secrets with Trusted Platform Modules
Abstract. We present a protocol that allows servers to securely distribute secrets to trusted platforms. The protocol maintains the confidentiality of secrets in the face of eaves...
Paul E. Sevinç, Mario Strasser, David A. Ba...
WISTP
2007
Springer
13 years 10 months ago
Optimistic Non-repudiation Protocol Analysis
Abstract. Non-repudiation protocols with session labels have a number of vulnerabilities. Recently Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol...
Judson Santiago, Laurent Vigneron
WISTP
2007
Springer
13 years 10 months ago
Performance Evaluation of Java Card Bytecodes
Pierre Paradinas, Julien Cordry, Samia Bouzefrane
WISTP
2007
Springer
13 years 10 months ago
An Embedded System for Practical Security Analysis of Contactless Smartcards
ISO 14443 compliant smartcards are widely-used in privacy and security sensitive applications. Due to the contactless interface, they can be activated and read out from a distance....
Timo Kasper, Dario Carluccio, Christof Paar
WISTP
2007
Springer
13 years 10 months ago
Linkability of Some Blind Signature Schemes
Unforgeability and blindness are two important properties of blind signature. The latter means that after interacting with various users, the signer is unable to link a valid messa...
Swee-Huay Heng, Wun-She Yap, Khoongming Khoo
WISTP
2007
Springer
13 years 10 months ago
An Information Flow Verifier for Small Embedded Systems
Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-...
WISTP
2007
Springer
13 years 10 months ago
Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks
Nicolas Fournel, Marine Minier, Stéphane Ub...
WISTP
2007
Springer
13 years 10 months ago
A New Resilient Key Management Protocol for Wireless Sensor Networks
Wireless Sensor Networks (WSN) security is an important issue which has been investigated by researchers for few years. The most fundamental security problem in WSN is key manageme...
Chakib Bekara, Maryline Laurent-Maknavicius