Sciweavers

2363 search results - page 347 / 473
» How Secure is RFID
Sort
View
207
Voted
CHES
2005
Springer
170views Cryptology» more  CHES 2005»
15 years 10 months ago
Design of Testable Random Bit Generators
Abstract. In this paper, the evaluation of random bit generators for security applications is discussed and the concept of stateless generator is introduced. It is shown how, for t...
Marco Bucci, Raimondo Luzzi
154
Voted
EGC
2005
Springer
15 years 10 months ago
Workflow-Oriented Collaborative Grid Portals
The paper presents how workflow-oriented, single-user Grid portals could be extended to meet the requirements of users with collaborative needs. Through collaborative Grid portals ...
Gergely Sipos, Gareth J. Lewis, Péter Kacsu...
ICCSA
2005
Springer
15 years 10 months ago
A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol
Recently, Nenadi´c et al. (2004) proposed the RSA-CEGD protocol for certified delivery of e-goods. This is a relatively complex scheme based on verifiable and recoverable encryp...
Almudena Alcaide, Juan M. Estévez-Tapiador,...
ISI
2005
Springer
15 years 10 months ago
Link Analysis Tools for Intelligence and Counterterrorism
Association rule mining is an important data analysis tool that can be applied with success to a variety of domains. However, most association rule mining algorithms seek to discov...
Antonio Badia, Mehmed M. Kantardzic
OOPSLA
2005
Springer
15 years 10 months ago
Interaction-based programming with classages
This paper presents Classages, a novel interaction-centric object-oriented language. Classes and objects in Classages are fully encapsulated, with explicit interfaces for all inte...
Yu David Liu, Scott F. Smith