Sciweavers

96 search results - page 16 / 20
» A Lightweight Secure Solution for RFID
Sort
View
HPCA
2006
IEEE
15 years 9 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
ICCSA
2005
Springer
15 years 2 months ago
Data Protection Based on Physical Separation: Concepts and Application Scenarios
Data protection is an increasingly important issue in today’s communication networks. Traditional solutions for protecting data when transferred over a network are almost exclusi...
Stefan Lindskog, Karl-Johan Grinnemo, Anna Brunstr...
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
15 years 10 months ago
An Efficient Method for Random Delay Generation in Embedded Software
Random delays are a countermeasure against a range of side channel and fault attacks that is often implemented in embedded software. We propose a new method for generation of rando...
Ilya Kizhvatov, Jean-Sébastien Coron
SNPD
2004
14 years 10 months ago
Payment-Based Email
Spam is a major problem facing email today, and current solutions are ineffective. This paper presents our progress towards defining and implementing a payment-based email deliver...
David A. Turner, Ni Deng
ICICS
2009
Springer
14 years 7 months ago
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model
The Trusted Computing Group (TCG) proposed remote attestation as a solution for establishing trust among distributed applications. However, current TCG attestation architecture req...
Anbang Ruan, Qingni Shen, Liang Gu, Li Wang, Lei S...