Sciweavers

546 search results - page 41 / 110
» On the Power of Secure Two-Party Computation
Sort
View
MOBISYS
2011
ACM
14 years 17 days ago
ProxiMate: proximity-based secure pairing using ambient wireless signals
Forming secure associations between wireless devices that do not share a prior trust relationship is an important problem. This paper presents ProxiMate, a system that allows wire...
Suhas Mathur, Robert C. Miller, Alexander Varshavs...
ICC
2007
IEEE
166views Communications» more  ICC 2007»
15 years 4 months ago
Dynamic Optimization of Secure Mobile Sensor Networks: A Genetic Algorithm
— We propose a reduced-complexity genetic algorithm for secure and dynamic deployment of resource constrained multi-hop mobile sensor networks. Mobility and security are relative...
Rahul Khanna, Huaping Liu, Hsiao-Hwa Chen
WISA
2004
Springer
15 years 3 months ago
Secure and Efficient AES Software Implementation for Smart Cards
In implementing cryptographic algorithms on limited devices such as smart cards, speed and memory optimization had always been a challenge. With the advent of side channel attacks,...
Elena Trichina, Lesya Korkishko
IJNSEC
2007
115views more  IJNSEC 2007»
14 years 9 months ago
Novel Secure Communication Protocol for Conditional Access System
A protocol for secure communication between set-top box and smart card in conditional access system is proposed. The proposed protocol uses the Schnorr identification scheme to a...
Yongliang Liu, Xiaolin Yang, Hongxun Yao, Wen Gao
WCE
2007
14 years 11 months ago
A Brief Survey on RFID Privacy and Security
Abstract— In this survey we take a look at different approaches proposed in the literature for addressing the privacy and security issues derived from the Radio-Frequency IDenti...
J. Aragones-Vilella, Antoni Martínez-Balles...