Sciweavers

1369 search results - page 72 / 274
» A Practical Implementation of the Timing Attack
Sort
View
96
Voted
WINET
2010
199views more  WINET 2010»
14 years 9 months ago
Secure encrypted-data aggregation for wireless sensor networks
This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks. Our design for data aggregation eliminates redundant sensor readings without using encr...
Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar
PERCOM
2007
ACM
15 years 10 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
15 years 4 months ago
Provably Secure Masking of AES
A general method to secure cryptographic algorithm implementations against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking...
Johannes Blömer, Jorge Guajardo, Volker Krumm...
BMCBI
2008
95views more  BMCBI 2008»
14 years 11 months ago
Methodology capture: discriminating between the "best" and the rest of community practice
Background: The methodologies we use both enable and help define our research. However, as experimental complexity has increased the choice of appropriate methodologies has become...
James M. Eales, John W. Pinney, Robert D. Stevens,...
92
Voted
SAC
2010
ACM
14 years 9 months ago
A formal approach to reuse successful traceability practices in SPL projects
Software Product Line (SPL) Engineering has to deal with interrelated, complex models such as feature and architecture models, hence traceability is fundamental to keep them consi...
Angelina Espinoza, Goetz Botterweck, Juan Garbajos...