Sciweavers

1255 search results - page 192 / 251
» On Simple and Secure Key Distribution
Sort
View
FC
2007
Springer
117views Cryptology» more  FC 2007»
15 years 10 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
DEXAW
2003
IEEE
108views Database» more  DEXAW 2003»
15 years 9 months ago
A Protocol for Programmable Smart Cards
This paper presents an open protocol for interoperability across multi-vendor programmable smart cards. It allows exposition of on-card storage and cryptographic services to host ...
Tommaso Cucinotta, Marco Di Natale, David Corcoran
ISQED
2010
IEEE
156views Hardware» more  ISQED 2010»
15 years 6 months ago
On the design of different concurrent EDC schemes for S-Box and GF(p)
Recent studies have shown that an attacker can retrieve confidential information from cryptographic hardware (e.g. the secret key) by introducing internal faults. A secure and re...
Jimson Mathew, Hafizur Rahaman, Abusaleh M. Jabir,...
SEKE
2010
Springer
15 years 2 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
TLT
2010
90views more  TLT 2010»
15 years 2 months ago
To Flow and Not to Freeze: Applying Flow Experience to Mobile Learning
— A key design goal of mobile learning is that its built-in experiences are enjoyable and proactive, empowering the learner with the knowledge and ability to self-manage. This im...
Jungho Park, David Parsons, Hokyoung Ryu