Sciweavers

1656 search results - page 188 / 332
» Secure Computation Without Authentication
Sort
View
101
Voted
ICISC
2008
123views Cryptology» more  ICISC 2008»
15 years 2 months ago
The Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
Chong Hee Kim, Gildas Avoine, François Koeu...
114
Voted
DBSEC
2003
149views Database» more  DBSEC 2003»
15 years 2 months ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...
105
Voted
IJNSEC
2008
132views more  IJNSEC 2008»
15 years 25 days ago
Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks
This paper presents the Trust Level Routing (TLR) protocol, an extension of the optimized energy-delay routing (OEDR) protocol, focusing on the integrity, reliability and survivab...
Eyad Taqieddin, S. Jagannathan, Ann Miller
121
Voted
CORR
2010
Springer
152views Education» more  CORR 2010»
14 years 11 months ago
A new key establishment scheme for wireless sensor networks
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the se...
Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu
104
Voted
EUROCRYPT
2009
Springer
16 years 1 months ago
Smashing SQUASH-0
At the RFID Security Workshop 2007, Adi Shamir presented a new challenge-response protocol well suited for RFIDs, although based on the Rabin public-key cryptosystem. This protocol...
Khaled Ouafi, Serge Vaudenay