Sciweavers

1085 search results - page 153 / 217
» A Timing Attack on RC5
Sort
View
ESORICS
2009
Springer
15 years 4 months ago
Security Threat Mitigation Trends in Low-Cost RFID Systems
Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
Joaquín García-Alfaro, Michel Barbea...
ISPEC
2009
Springer
15 years 4 months ago
Hash-Based Key Management Schemes for MPEG4-FGS
We propose two symmetric-key management schemes for the encryption of scalable compressed video content. The schemes are applicable to MPEG-4 Fine Grain Scalability video coding. O...
Mohamed Karroumi, Ayoub Massoudi
WMCSA
2009
IEEE
15 years 4 months ago
We saw each other on the subway: secure, anonymous proximity-based missed connections
There is an inherent tension between the value provided by Location-Based Services (LBSs) and the location-privacy concerns they raise. Unfortunately, users are often forced to ei...
Justin Manweiler, Ryan Scudellari, Zachary Cancio,...
ICIG
2009
IEEE
15 years 4 months ago
Analysis and Evaluation of the ColorLogin Graphical Password Scheme
It is believed that graphical passwords are more memorable than traditional textual passwords, but usually seen as complex and time-consuming for users. Furthermore, most of the e...
Haichang Gao, Xiyang Liu, Ruyi Dai, Sidong Wang, X...
CODCRY
2009
Springer
111views Cryptology» more  CODCRY 2009»
15 years 4 months ago
On the Impossibility of Strong Encryption Over
We give two impossibility results regarding strong encryption over an infinite enumerable domain. The first one relates to statistically secure one-time encryption. The second on...
Raphael C.-W. Phan, Serge Vaudenay