Sciweavers

300 search results - page 9 / 60
» Lightweight secure PUFs
Sort
View
CCS
2009
ACM
15 years 1 months ago
On lightweight mobile phone application certification
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of appli...
William Enck, Machigar Ongtang, Patrick Drew McDan...
IADIS
2004
14 years 11 months ago
Analysis of Java-Based End-to-End Wireless Internet Security
The third and fourth generation wireless devices will require increasingly End
Larry Hughes, Abdul-Kadhim Hay'awi
WWW
2002
ACM
15 years 10 months ago
A lightweight protocol for the generation and distribution of secure e-coupons
Carlo Blundo, Stelvio Cimato, Annalisa De Bonis
SIGSOFT
2007
ACM
15 years 10 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
ASM
2010
ASM
15 years 6 months ago
Lightweight Modeling of Java Virtual Machine Security Constraints
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly i...
Mark C. Reynolds