Sciweavers

2363 search results - page 46 / 473
» How Secure is RFID
Sort
View
OOPSLA
1998
Springer
15 years 8 months ago
How to Preserve the Benefits of Design Patterns
The rapid evolution of Design Patterns has hampered the benefits gained from using Design Patterns. The increase in the number of Design Patterns makes a common vocabulary unmanag...
Ellen Agerbo, Aino Cornils
TII
2008
132views more  TII 2008»
15 years 4 months ago
Credential Management for Automatic Identification Solutions in Supply Chain Management
Current systems for automatic identification of goods presume a single administrative domain. However, in supply chain management systems temporary cooperations of multiple compani...
Marcel Henseler, Michael Rossberg, Guenter Schaefe...
CORR
2010
Springer
146views Education» more  CORR 2010»
15 years 27 days ago
NLHB : A Non-Linear Hopper Blum Protocol
The Hopper-Blum (HB) protocol, which uses noised linear parities of a shared key for authentication, has been proposed for light-weight applications such as RFID. Recently, algorit...
Mukundan Madhavan, Andrew Thangaraj, Yogesh Sankar...
CORR
2010
Springer
141views Education» more  CORR 2010»
14 years 11 months ago
Data Preservation in High Energy Physics - why, how and when?
Long-term preservation of data and software of large experiments and detectors in high energy physics is of utmost importance to secure the heritage of (mostly unique) data and to...
Siegfried Bethke
PERCOM
2008
ACM
16 years 3 months ago
A tamper-proof and lightweight authentication scheme
We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, w...
Ghaith Hammouri, Erdinç Öztürk, Berk Sunar