Sciweavers

1769 search results - page 30 / 354
» Cryptography
Sort
View
ICISC
2009
108views Cryptology» more  ICISC 2009»
14 years 7 months ago
Lightweight Cryptography and RFID: Tackling the Hidden Overheads
Abstract. The field of lightweight cryptography has developed significantly over recent years and many impressive implementation results have been published. However these results ...
Axel Poschmann, Matthew J. B. Robshaw, Frank Vater...
PERCOM
2007
ACM
15 years 9 months ago
Public-Key Cryptography for RFID-Tags
Lejla Batina, Jorge Guajardo, Tim Kerins, Nele Men...
PERCOM
2005
ACM
15 years 9 months ago
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
Security in wireless sensor networks is currently provided exclusively through symmetric key cryptography. In this paper we show that special purpose ultra-low power hardware impl...
Berk Sunar, Erdinç Öztürk, Gunnar...
CRYPTO
2009
Springer
113views Cryptology» more  CRYPTO 2009»
15 years 4 months ago
Abstraction in Cryptography
ion in Cryptography Ueli Maurer ETH Zurich CRYPTO 2009, August 19, 2009
Ueli M. Maurer
86
Voted
CIS
2007
Springer
15 years 3 months ago
A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key Cryptography
The session initiation protocol (SIP) is considered as the dominant signaling protocol for calls over the internet. However, SIP authentication typically uses HTTP digest authentic...
Fengjiao Wang, Yuqing Zhang