Sciweavers

1627 search results - page 71 / 326
» High Security Smartcards
Sort
View
SIGADA
1998
Springer
15 years 4 months ago
Looking into Safety with the Safety and Security Rapporteur Group
The requirements of High Integrity safety-critical, secure and mission-critical Software force developers to use specialised development techniques. Often the choice of computer l...
Stephen Michell, Mark Saaltink, Brian A. Wichmann
INFOCOM
2009
IEEE
15 years 6 months ago
Secure Range Queries in Tiered Sensor Networks
—We envision a two-tier sensor network which consists of resource-rich master nodes at the upper tier and resourcepoor sensor nodes at the lower tier. Master nodes collect data f...
Jing Shi, Rui Zhang, Yanchao Zhang
APPROX
2009
Springer
98views Algorithms» more  APPROX 2009»
15 years 6 months ago
On the Security of Goldreich's One-Way Function
Goldreich (ECCC 2000) suggested a simple construction of a candidate one-way function f : {0, 1}n → {0, 1}m where each bit of output is a fixed predicate P of a constant number ...
Andrej Bogdanov, Youming Qiao
IJBC
2008
87views more  IJBC 2008»
14 years 12 months ago
Digital Secure-Communication Using Robust Hyper-Chaotic Systems
Abstract-- In this paper, we propose a robust hyperchaotic system that is practically serviceable in digital securecommunication. The system consists of many coupled robust logisti...
Shih-Liang Chen, Shu-Ming Chang, Wen-Wei Lin, Ting...
INFOCOM
2010
IEEE
14 years 10 months ago
Castor: Scalable Secure Routing for Ad Hoc Networks
—Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have b...
Wojciech Galuba, Panos Papadimitratos, Marcin Potu...