Sciweavers

2363 search results - page 55 / 473
» How Secure is RFID
Sort
View
CIG
2005
IEEE
15 years 10 months ago
How to Protect Peer-to-Peer Online Games from Cheats
Abstract- Recently, P2P (peer-to-peer) online game systems have attracted a great deal of public attention. They work without central servers, thus, the maintenance and organizatio...
Haruhiro Yoshimoto, Rie Shigetomi, Hideki Imai
ACNS
2003
Springer
130views Cryptology» more  ACNS 2003»
15 years 9 months ago
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
Key exposures, known or inconspicuous, are a real security threat. Recovery mechanisms from such exposures are required. For digital signatures such a recovery should ideally —an...
Gene Itkis, Peng Xie
CARDIS
2000
Springer
150views Hardware» more  CARDIS 2000»
15 years 8 months ago
How to Turn a GSM SIM into a Web Server
: We describe the WebSIM, an approach that integrates GSM SIMs into the Internet. The underlying idea is to implement a Web Server inside a SIM, and to allow for transparent access...
Scott B. Guthery, Roger Kehr, Joachim Posegga
PET
2010
Springer
15 years 8 months ago
How to Share Your Favourite Search Results while Preserving Privacy and Quality
Personalised social search is a promising avenue to increase the relevance of search engine results by making use of recommendations made by friends in a social network. More gener...
George Danezis, Tuomas Aura, Shuo Chen, Emre Kicim...
SP
2008
IEEE
115views Security Privacy» more  SP 2008»
15 years 4 months ago
Compromising Reflections-or-How to Read LCD Monitors around the Corner
We present a novel eavesdropping technique for spying at a distance on data that is displayed on an arbitrary computer screen, including the currently prevalent LCD monitors. Our ...
Michael Backes, Markus Dürmuth, Dominique Unr...