Sciweavers

3751 search results - page 601 / 751
» Events in security protocols
Sort
View
110
Voted
CORR
2006
Springer
125views Education» more  CORR 2006»
15 years 22 days ago
Reversible Logic to Cryptographic Hardware: A New Paradigm
Differential Power Analysis (DPA) presents a major challenge to mathematically-secure cryptographic protocols. Attackers can break the encryption by measuring the energy consumed i...
Himanshu Thapliyal, Mark Zwolinski
133
Voted
CL
2007
Springer
15 years 21 days ago
A bulk-synchronous parallel process algebra
The CCS (Calculus of Communicating Systems) process algebra is a well-known formal model of synchronization and communication. It is used for the analysis of safety and liveness i...
Armelle Merlin, Gaétan Hains
IJSN
2006
116views more  IJSN 2006»
15 years 21 days ago
A lightweight encryption and authentication scheme for wireless sensor networks
: The research of Wireless Sensor Networks (WSNs) has recently received a strong boost from IEEE 802.15.4 task group, which focuses on the specifications for low rate wireless pers...
Jianliang Zheng, Jie Li, Myung J. Lee, Michael Ans...
IJCIS
1998
107views more  IJCIS 1998»
15 years 11 days ago
Supporting Electronic Commerce Transactions with Contracting Services
Abstracting from basic communication mechanisms such as transactionally secure remote procedure calls and remote database access mechanisms, this includes service trading and bro...
Michael Merz, Frank Griffel, M. Tuan Tu, Stefan M&...
103
Voted
SAC
2008
ACM
15 years 5 days ago
Privacy-preserving link discovery
Abstract. Link discovery is a process of identifying association(s) among different entities included in a complex network structure. These association(s) may represent any interac...
Xiaoyun He, Basit Shafiq, Jaideep Vaidya, Nabil R....