Sciweavers

14824 search results - page 2741 / 2965
» Security - Introduction
Sort
View
101
Voted
TMC
2008
90views more  TMC 2008»
15 years 2 months ago
Trust-Based Fast Authentication for Multiowner Wireless Networks
In multiowner wireless networks, access points (APs) are owned and operated by different administrations, leading to significant authentication delays during handoff between APs. W...
Jahan Hassan, Harsha Sirisena, Björn Landfeld...
155
Voted
JCIT
2007
159views more  JCIT 2007»
15 years 2 months ago
GDIA: A Scalable Grid Infrastructure for Data Intensive Applications
The applications in many scientific fields, like bioinformatics and high-energy physics etc, increasingly demand the computing infrastructures can provide more computing power and...
Xiaohui Wei, Zhaohui Ding, Wilfred W. Li, Osamu Ta...
121
Voted
JCM
2007
143views more  JCM 2007»
15 years 2 months ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi
119
Voted
JCP
2007
86views more  JCP 2007»
15 years 2 months ago
Taking Multiple-Choise Quiz by SMS on Mobile Phones Including Analyzing Property
— Recently Mobile Learning (M-Learning) has attracted much attention. Due to advantages of SMS (Short Messaging Service) on mobile phones we present a safe and protected method f...
Mohammad Shirali-Shahreza
130
Voted
JCP
2007
127views more  JCP 2007»
15 years 2 months ago
Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve Cryptosystem
Abstract— Side channel attacks such as Simple Power Analysis(SPA) attacks provide a new challenge for securing algorithms from an attacker. Algorithms for elliptic curve point sc...
Andrew Byrne, Nicolas Meloni, Arnaud Tisserand, Em...
« Prev « First page 2741 / 2965 Last » Next »