Sciweavers

400 search results - page 18 / 80
» RFID Security: Tradeoffs between Security and Efficiency
Sort
View
WETICE
2009
IEEE
15 years 4 months ago
A Game Theoretical Approach in Securing P2P Storage against Whitewashers
—An inherent problem to a cooperation incentive mechanism implemented into a dynamic system where peers may join or leave at any time is the whitewashing problem. Whitewashers ar...
Nouha Oualha, Yves Roudier
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
15 years 2 months ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys
CRYPTO
2010
Springer
167views Cryptology» more  CRYPTO 2010»
14 years 11 months ago
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost
Multiparty computation protocols have been known for more than twenty years now, but due to their lack of efficiency their use is still limited in real-world applications: the goal...
Ivan Damgård, Claudio Orlandi
ICCCN
2008
IEEE
15 years 4 months ago
Security Extensions for Space-Link Communication
—In recent times, the importance of information security in civilian space communication systems has increased significantly among space agencies. Those systems often require a ...
Daniel Fischer, Mario Merri, Thomas Engel
SEC
2001
14 years 11 months ago
On Securely Scheduling a Meeting
Abstract When people want to schedule a meeting, their agendas must be compared to find a time suitable for all participants. At the same time, people want to keep their agendas pr...
T. Herlea, Joris Claessens, Bart Preneel, Gregory ...