Sciweavers

2363 search results - page 45 / 473
» How Secure is RFID
Sort
View
CORR
2010
Springer
84views Education» more  CORR 2010»
15 years 4 months ago
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Line...
Mohammad Reza Sohizadeh Abyaneh
CCS
2011
ACM
14 years 4 months ago
How to break XML encryption
XML Encryption was standardized by W3C in 2002, and is implemented in XML frameworks of major commercial and open-source organizations like Apache, redhat, IBM, and Microsoft. It ...
Tibor Jager, Somorovsky Juraj
HICSS
2007
IEEE
135views Biometrics» more  HICSS 2007»
15 years 10 months ago
Context-Based Recommender Systems in Conventional Grocery--An Economic Analysis
In today’s grocery the products are getting more homogenous and attributes are getting more complex. Consumers should be supported in their decisions during the shopping process...
Daniel Ch. Buser
CRYPTO
2009
Springer
119views Cryptology» more  CRYPTO 2009»
15 years 10 months ago
How Risky Is the Random-Oracle Model?
RSA-FDH and many other schemes secure in the Random-Oracle Model (ROM) require a hash function with output size larger than standard sizes. We show that the random-oracle instanti...
Gaëtan Leurent, Phong Q. Nguyen
CRYPTO
2008
Springer
93views Cryptology» more  CRYPTO 2008»
15 years 6 months ago
Distributed Private Data Analysis: Simultaneously Solving How and What
We examine the combination of two directions in the field of privacy concerning computations over distributed private inputs
Amos Beimel, Kobbi Nissim, Eran Omri