Sciweavers

677 search results - page 115 / 136
» Secure Pseudonymous Channels
Sort
View
SP
2009
IEEE
130views Security Privacy» more  SP 2009»
15 years 4 months ago
Wirelessly Pickpocketing a Mifare Classic Card
The Mifare Classic is the most widely used contactless smartcard on the market. The stream cipher CRYPTO1 used by the Classic has recently been reverse engineered and serious atta...
Flavio D. Garcia, Peter van Rossum, Roel Verdult, ...
NORDSEC
2009
Springer
15 years 4 months ago
Facilitating the Adoption of Tor by Focusing on a Promising Target Group
The technology for anonymous communication has been thoroughly researched. But despite the existence of several protection services, a business model for anonymous web surfing has ...
Heiko Roßnagel, Jan Zibuschka, Lexi Pimenidi...
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
15 years 4 months ago
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
We consider the following problem: how can two devices that do not share any secrets establish a shared secret key over a wireless radio channel in the presence of a communication...
Mario Strasser, Christina Pöpper, Srdjan Capk...
71
Voted
SP
2008
IEEE
133views Security Privacy» more  SP 2008»
15 years 4 months ago
ClearShot: Eavesdropping on Keyboard Input from Video
Eavesdropping on electronic communication is usually prevented by using cryptography-based mechanisms. However, these mechanisms do not prevent one from obtaining private informat...
Davide Balzarotti, Marco Cova, Giovanni Vigna
95
Voted
ICMCS
2007
IEEE
175views Multimedia» more  ICMCS 2007»
15 years 4 months ago
Clicker - An IPTV Remote Control in Your Cell Phone
This paper investigates a novel concept of providing seamless control and portability of an IPTV viewing session. A solution employing a middleware system, a secure hardware token...
Rittwik Jana, Yih-Farn Chen, David C. Gibbon, Yenn...