Sciweavers

2363 search results - page 139 / 473
» How Secure is RFID
Sort
View
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
15 years 11 months ago
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks
Abstract. What are the real security issues for a wireless sensor network (WSN) intended to monitor the structural health of a suspension bridge, a subway tunnel or a water distrib...
Frank Stajano, Daniel Cvrcek, Matt Lewis
IPPS
2007
IEEE
15 years 11 months ago
On the Security of Ultrasound as Out-of-band Channel
Ultrasound has been proposed as out-of-band channel for authentication of peer devices in wireless ad hoc networks. Ultrasound can implicitly contribute to secure communication ba...
Rene Mayrhofer, Hans Gellersen
SPC
2005
Springer
15 years 10 months ago
A Theorem Proving Approach to Analysis of Secure Information Flow
Abstract. Most attempts at analysing secure information flow in programs are based on domain-specific logics. Though computationally feahese approaches suffer from the need for ...
Ádám Darvas, Reiner Hähnle, Dav...
ICICS
2004
Springer
15 years 10 months ago
Automatic Covert Channel Analysis of a Multilevel Secure Component
Abstract. The NRL Pump protocol defines a multilevel secure component whose goal is to minimize leaks of information from high level systems to lower level systems, without degrad...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone...
119
Voted
CTRSA
2003
Springer
105views Cryptology» more  CTRSA 2003»
15 years 10 months ago
Forward-Security in Private-Key Cryptography
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based cryptographic primitives, as a practical means to mitigate the damage caused by...
Mihir Bellare, Bennet S. Yee