Sciweavers

2363 search results - page 119 / 473
» How Secure is RFID
Sort
View
195
Voted
EGCDMAS
2004
147views ECommerce» more  EGCDMAS 2004»
15 years 6 months ago
Should We Prove Security Policies Correct?
Security policies are abstract descriptions of how a system should behave to be secure. They typically express what is obligatory, permitted, or forbidden in the system. When the s...
Sebastiano Battiato, Giampaolo Bella, Salvatore Ri...
187
Voted
IADIS
2003
15 years 6 months ago
Enhance Opensst Protocol's Security with Smart Card
As an open source project, Open Simple Secure Transaction (OpenSST) protocol aims to be a secure and transactionoriented protocol for the unsecured network. At present a prototype...
Xinhua Zhang, Alexandre Dulaunoy, Christoph Meinel
120
Voted
ACNS
2010
Springer
134views Cryptology» more  ACNS 2010»
15 years 6 months ago
Efficient and Secure Evaluation of Multivariate Polynomials and Applications
In this work, we design two-party and multiparty protocols for evaluating multivariate polynomials at participants' inputs with security against a malicious adversary who may ...
Matthew K. Franklin, Payman Mohassel
143
Voted
CORR
2007
Springer
150views Education» more  CORR 2007»
15 years 4 months ago
Composable Security in the Bounded-Quantum-Storage Model
We give a new, simulation-based, definition for security in the bounded-quantum-storage model, and show that this definition allows for sequential composition of protocols. Damg...
Stephanie Wehner, Jürg Wullschleger
JCM
2007
80views more  JCM 2007»
15 years 4 months ago
On the Impact of Security on the Performance of WLANs
— This paper investigates the impact of security on the performance of WLAN. More specifically, it analyzes the impact of different implementations of encryption techniques used ...
Ezedin Barka, Mohammed Boulmalf