Sciweavers

1462 search results - page 246 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
OTM
2005
Springer
15 years 5 months ago
Distributed Authentication in GRID5000
Abstract. Between high-performance clusters and grids appears an intermediate infrastructure called cluster grid that corresponds to the interconnection of clusters through the Int...
Sébastien Varrette, Sebastien Georget, Joha...
CCS
2011
ACM
13 years 11 months ago
Practical PIR for electronic commerce
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Ryan Henry, Femi G. Olumofin, Ian Goldberg
DATE
2005
IEEE
125views Hardware» more  DATE 2005»
15 years 5 months ago
Hardware Engines for Bus Encryption: A Survey of Existing Techniques
The widening spectrum of applications and services provided by portable and embedded devices bring a new dimension of concerns in security. Most of those embedded systems (pay-TV,...
Reouven Elbaz, Lionel Torres, Gilles Sassatelli, P...
CCS
2007
ACM
15 years 6 months ago
Robust group key agreement using short broadcasts
A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
IOT
2010
14 years 9 months ago
BIT - A framework and architecture for providing digital services for physical products
Abstract--Mobile phones are increasingly able to read autoid labels, such as barcodes or RFID tags. As virtually all consumer products sold today are equipped with such a label, th...
Christof Roduner, Marc Langheinrich