Sciweavers

2363 search results - page 40 / 473
» How Secure is RFID
Sort
View
CRYPTO
1987
Springer
87views Cryptology» more  CRYPTO 1987»
15 years 7 months ago
How to Make Replicated Data Secure
Many distributed systems manage some form of long-lived data, such as files or data bases. The performance and fault-tolerance of such systems may be enhanced if the repositories ...
Maurice Herlihy, J. D. Tygar
EUROCRYPT
2001
Springer
15 years 8 months ago
How Secure Are Elliptic Curves over Composite Extension Fields?
We compare the method of Weil descent for solving the ECDLP, over extensions fields of composite degree in characteristic two, against the standard method of parallelised Pollard ...
Nigel P. Smart
122
Voted
CORR
2010
Springer
102views Education» more  CORR 2010»
15 years 4 months ago
How to prevent type-flaw and multi-protocol attacks on security protocols under Exclusive-OR
Type-flaw attacks and multi-protocol attacks on security protocols have been frequently reported in the literature. Heather et al. and Guttman et al. proved that these could be pr...
Sreekanth Malladi
108
Voted
USAB
2008
15 years 5 months ago
How Image Based Factors and Human Factors Contribute to Threat Detection Performance in X-Ray Aviation Security Screening
The present study examines the relative importance of a series of known and expected factors that highly affect threat detection performance in aviation security X-ray screening. E...
Anton Bolfing, Tobias Halbherr, Adrian Schwaninger