Sciweavers

1564 search results - page 188 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
WISA
2009
Springer
15 years 2 months ago
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment
We introduce low-cost hardware for performing non-invasive side-channel attacks on Radio Frequency Identication Devices (RFID) and develop techniques for facilitating a correlatio...
Timo Kasper, David Oswald, Christof Paar
CRYPTO
2001
Springer
97views Cryptology» more  CRYPTO 2001»
15 years 2 months ago
Two-Party Generation of DSA Signatures
d Abstract) Philip MacKenzie and Michael K. Reiter Bell Labs, Lucent Technologies, Murray Hill, NJ, USA We describe a means of sharing the DSA signature function, so that two parti...
Philip D. MacKenzie, Michael K. Reiter
AGENTS
1999
Springer
15 years 2 months ago
The UMASS Intelligent Home Project
Intelligent environmentsareaninterestingdevelopmentandresearchapplication problem for multi-agent systems.The functionalandspatialdistribution of tasksnaturally lendsitself to a m...
Victor R. Lesser, Michael Atighetchi, Brett Benyo,...
FSE
1999
Springer
94views Cryptology» more  FSE 1999»
15 years 2 months ago
On the Construction of Variable-Input-Length Ciphers
Whereas a block cipher enciphers messages of some one particular length the blocklength, a variable-input-length cipher takes messages of varying and preferably arbitrary leng...
Mihir Bellare, Phillip Rogaway
MAS
1998
Springer
153views Communications» more  MAS 1998»
15 years 2 months ago
Authentication for Mobile Agents
In mobile agent systems, program code together with some process state can autonomously migrate to new hosts. Despite its many practical benefits, mobile agent technology results i...
Shimshon Berkovits, Joshua D. Guttman, Vipin Swaru...