Sciweavers

2363 search results - page 43 / 473
» How Secure is RFID
Sort
View
ASAP
2008
IEEE
182views Hardware» more  ASAP 2008»
15 years 10 months ago
Low-cost implementations of NTRU for pervasive security
NTRU is a public-key cryptosystem based on the shortest vector problem in a lattice which is an alternative to RSA and ECC. This work presents a compact and low power NTRU design ...
Ali Can Atici, Lejla Batina, Junfeng Fan, Ingrid V...
IAW
2003
IEEE
15 years 9 months ago
Insecure Programming: How Culpable is a Language's Syntax?
— Vulnerabilities in software stem from poorly written code. Inadvertent errors may creep in due to programmers not being aware of the security implications of their code. Writin...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...
150
Voted
EUROCRYPT
2012
Springer
13 years 6 months ago
Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security
We present a new approach for creating chosen ciphertext secure encryption. The focal point ork is a new abstraction that we call Detectable Chosen Ciphertext Security (DCCA). Int...
Susan Hohenberger, Allison B. Lewko, Brent Waters
ICDCS
2010
IEEE
15 years 6 months ago
Using Analog Network Coding to Improve the RFID Reading Throughput
Abstract—RFID promises to revolutionize the inventory management in large warehouses, retail stores, hospitals, transportation systems, etc. Periodically reading the IDs of the t...
Ming Zhang, Tao Li, Shigang Chen, Bo Li
IDEAS
2007
IEEE
99views Database» more  IDEAS 2007»
15 years 10 months ago
Implementing Physical Hyperlinks for Mobile Applications Using RFID Tags
Hyperlinks are a well understood and widely used concept in many applications. Particularly the Web has promoted the concept of “clickable” links to users. Typically, hyperlin...
Joachim Schwieren, Gottfried Vossen