Sciweavers

4529 search results - page 25 / 906
» Position Based Cryptography
Sort
View
78
Voted
ICC
2007
IEEE
15 years 6 months ago
UWB Based Positioning in Multipath Channels: CRBs for AOA and for Hybrid TOA-AOA Based Methods
— In this paper we consider UWB (ultra wide band) based positioning. We derive the CRBs (Cramer Rao bound) for AOA (angle of arrival) and for hybrid method using both AOA and TOA...
Achraf Mallat, Jérôme Louveaux, Luc V...
ESAS
2007
Springer
15 years 6 months ago
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems
RFID-tags can be seen as a new generation of bar codes with added functionality. They are becoming very popular tools for identification of products in various applications such a...
Neil Bird, Claudine Conrado, Jorge Guajardo, Stefa...
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 3 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
EUROCRYPT
2000
Springer
15 years 3 months ago
Security Aspects of Practical Quantum Cryptography
The use of quantum bits (qubits) in cryptography holds the promise of secure cryptographic quantum key distribution schemes. Unfortunately, the implemented schemes are often operat...
Gilles Brassard, Norbert Lütkenhaus, Tal Mor,...
USS
2008
15 years 2 months ago
Practical Symmetric Key Cryptography on Modern Graphics Hardware
Graphics processors are continuing their trend of vastly outperforming CPUs while becoming more general purpose. The latest generation of graphics processors have introduced the a...
Owen Harrison, John Waldron