Sciweavers

1342 search results - page 219 / 269
» Attacks are Protocols Too
Sort
View
PERCOM
2007
ACM
16 years 1 months ago
Physically Unclonable Function-Based Security and Privacy in RFID Systems
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Tracking and authentication in RFID tags have raised...
Leonid Bolotnyy, Gabriel Robins
FOSSACS
2010
Springer
15 years 8 months ago
Retaining the Probabilities in Probabilistic Testing Theory
Abstract. This paper considers the probabilistic may/must testing theory for processes having external, internal, and probabilistic choices. We observe that the underlying testing ...
Sonja Georgievska, Suzana Andova
ASIACRYPT
2009
Springer
15 years 8 months ago
Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
We demonstrate how the framework that is used for creating efficient number-theoretic ID and signature schemes can be transferred into the setting of lattices. This results in cons...
Vadim Lyubashevsky
COMPSAC
2007
IEEE
15 years 8 months ago
A Service Discovery Architecture based on Anycast in Pervasive Computing Environments
Service discovery is very useful in pervasive computing environments. A service discovery architecture based on anycast is proposed. A wellknown anycast address is defined first, ...
Li Zhang, Zhen-lian Shi, Qi Shen
COMSWARE
2007
IEEE
15 years 8 months ago
Exploiting Energy-aware Spatial Correlation in Wireless Sensor Networks
Abstract— Wireless sensor networks (WSNs) promise finegrain monitoring in a wide variety of applications, which require dense sensor nodes deployment. Due to high density of nod...
Ghalib A. Shah, Muslim Bozyigit