Sciweavers

422 search results - page 23 / 85
» Protocol Specialization
Sort
View
SACRYPT
2005
Springer
189views Cryptology» more  SACRYPT 2005»
15 years 7 months ago
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
The ability to link two different sightings of the same Radio Frequency Identification (RFID) tag enables invasions of privacy. The problem is aggravated when an item, and the ta...
David Molnar, Andrea Soppera, David Wagner
114
Voted
CARDIS
2006
Springer
159views Hardware» more  CARDIS 2006»
15 years 5 months ago
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Claude Castelluccia, Gildas Avoine
115
Voted
SIROCCO
2004
15 years 3 months ago
Path Layout on Tree Networks: Bounds in Different Label Switching Models
Path Layout is a fundamental graph problem in label switching protocols. This problem is raised in various protocols such as the traditional ATM protocol and MPLS which is a new l...
Anat Bremler-Barr, Leah Epstein
ATAL
2004
Springer
15 years 7 months ago
Reaching Diagnostic Agreement in Multi-Agent Diagnosis
We consider the problem of finding a commonly agreed upon diagnosis for errors observed in a system monitored by a number of different expert agents. Each agent is assumed to hav...
Nico Roos, Annette ten Teije, Cees Witteveen
95
Voted
WMCSA
2000
IEEE
15 years 6 months ago
Networked surfaces: a new concept in mobile networking
Networked Surfaces are surfaces which provide network connectivity to specially augmented objects, when these objects are physically placed on top of the surface. When an object (...
James Scott, Frank Hoffmann, Mike Addlesee, Glenfo...