Sciweavers

4305 search results - page 574 / 861
» Analysing Protocol Implementations
Sort
View
PERCOM
2007
ACM
16 years 4 months ago
Facilitating RFID Development with the Accada Prototyping Platform
The proliferation of radiofrequency identification systems in application domains such as supply chain management requires an IT infrastructure that provides RFID device and data ...
Christian Floerkemeier, Matthias Lampe, Christof R...
DCC
2006
IEEE
16 years 4 months ago
Practical Low Delay Broadcast of Compressed Variable Bit Rate Movies
H.264 is currently the best way to compress media to achieve high quality at low bandwidth. Since its inception, technologies such as video-on-demand are increasingly realizable. ...
Neva Cherniavsky
ACISICIS
2009
IEEE
15 years 11 months ago
BackupIT: An Intrusion-Tolerant Cooperative Backup System
Reliable storage of large amounts of data is always a delicate issue. Availability, efficiency, data integrity, and confidentiality are some features a data backup system should...
Sérgio Raymundo Loest, Marcelo Cheminn Madr...
CTRSA
2009
Springer
142views Cryptology» more  CTRSA 2009»
15 years 11 months ago
Attacks on the DECT Authentication Mechanisms
Digital Enhanced Cordless Telecommunications (DECT) is a standard for connecting cordless telephones to a fixed telecommunications network over a short range. The cryptographic al...
Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Phi...
NDSS
2009
IEEE
15 years 11 months ago
CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable
We describe CSAR, a novel technique for generating cryptographically strong, accountable randomness. Using CSAR, we can generate a pseudo-random sequence and a proof that the elem...
Michael Backes, Peter Druschel, Andreas Haeberlen,...