Sciweavers

24188 search results - page 397 / 4838
» Computing on Encrypted Data
Sort
View
ICON
2007
IEEE
15 years 11 months ago
A Location-aware Key Predistribution Scheme for Distributed Wireless Sensor Networks
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of th...
Ngo Trong Canh, Tran Van Phuong, Young-Koo Lee, Su...
IPPS
2007
IEEE
15 years 11 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
UCS
2007
Springer
15 years 11 months ago
RFID Privacy Using Spatially Distributed Shared Secrets
Many of today’s proposed RFID privacy schemes rely on the encryption of tag IDs with user-chosen keys. However, password management quickly becomes a bottleneck in such proposals...
Marc Langheinrich, Remo Marti
IPPS
2006
IEEE
15 years 10 months ago
Analysis of a reconfigurable network processor
In this paper an analysis of a dynamically reconfigurable processor is presented. The network processor incorporates a processor and a number of coprocessors that can be connected...
Christopher Kachris, Stamatis Vassiliadis
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 10 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee