Sciweavers

5324 search results - page 765 / 1065
» Internet Security Protocols
Sort
View
ESORICS
2008
Springer
15 years 2 months ago
User Privacy in Transport Systems Based on RFID E-Tickets
Abstract. Recently, operators of public transportation in many countries started to roll out electronic tickets (e-tickets). E-tickets offer several advantages to transit enterpris...
Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachs...
111
Voted
CORR
2006
Springer
125views Education» more  CORR 2006»
15 years 24 days ago
Reversible Logic to Cryptographic Hardware: A New Paradigm
Differential Power Analysis (DPA) presents a major challenge to mathematically-secure cryptographic protocols. Attackers can break the encryption by measuring the energy consumed i...
Himanshu Thapliyal, Mark Zwolinski
IJSN
2006
116views more  IJSN 2006»
15 years 22 days ago
A lightweight encryption and authentication scheme for wireless sensor networks
: The research of Wireless Sensor Networks (WSNs) has recently received a strong boost from IEEE 802.15.4 task group, which focuses on the specifications for low rate wireless pers...
Jianliang Zheng, Jie Li, Myung J. Lee, Michael Ans...
IJCIS
1998
107views more  IJCIS 1998»
15 years 13 days ago
Supporting Electronic Commerce Transactions with Contracting Services
Abstracting from basic communication mechanisms such as transactionally secure remote procedure calls and remote database access mechanisms, this includes service trading and bro...
Michael Merz, Frank Griffel, M. Tuan Tu, Stefan M&...
103
Voted
SAC
2008
ACM
15 years 7 days ago
Privacy-preserving link discovery
Abstract. Link discovery is a process of identifying association(s) among different entities included in a complex network structure. These association(s) may represent any interac...
Xiaoyun He, Basit Shafiq, Jaideep Vaidya, Nabil R....