Sciweavers

3504 search results - page 415 / 701
» Secure protocol composition
Sort
View
108
Voted
CCS
2008
ACM
15 years 4 months ago
Robust, anonymous RFID authentication with constant key-lookup
A considerable number of anonymous RFID authentication schemes have been proposed. However, current proposals either do not provide robust security guarantees, or suffer from scal...
Mike Burmester, Breno de Medeiros, Rossana Motta
123
Voted
ESORICS
2008
Springer
15 years 4 months ago
Sharemind: A Framework for Fast Privacy-Preserving Computations
Gathering and processing sensitive data is a difficult task. In fact, there is no common recipe for building the necessary information systems. In this paper, we present a provably...
Dan Bogdanov, Sven Laur, Jan Willemson
106
Voted
ICCD
2005
IEEE
96views Hardware» more  ICCD 2005»
15 years 11 months ago
File System Interfaces for Embedded Software Development
We present a scalable architectural approach which aims to simplify embedded software development by supporting key development tasks like debugging, tracing and monitoring. Our a...
Bhanu Pisupati, Geoffrey Brown
111
Voted
ICDCS
2009
IEEE
15 years 11 months ago
Distributed Key Generation for the Internet
Although distributed key generation (DKG) has been studied for some time, it has never been examined outside of the synchronous setting. We present the first realistic DKG archit...
Aniket Kate, Ian Goldberg
ATVA
2005
Springer
156views Hardware» more  ATVA 2005»
15 years 8 months ago
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent c...
Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli