Sciweavers

623 search results - page 34 / 125
» Side-Channel Issues for Designing Secure Hardware Implementa...
Sort
View
122
Voted
EUC
2007
Springer
15 years 7 months ago
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks
Traditional cryptographic primitives are not supported on low-cost RFID tags since, at most, 4K gates can be devoted to securityrelated tasks. Despite this, there are a vast number...
Pedro Peris-Lopez, Julio César Herná...
128
Voted
IACR
2011
137views more  IACR 2011»
14 years 3 months ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...
126
Voted
TEAA
2005
Springer
126views Hardware» more  TEAA 2005»
15 years 9 months ago
Towards a Secure Data Stream Management System
Abstract. Todays data stream management systems (DSMSs) lack security functionality. Based on adversary scenarios we show how a DSMS architecture can be protected. We sketch a gene...
Wolfgang Lindner, Jörg Meier
115
Voted
CONEXT
2006
ACM
15 years 9 months ago
Secure sensor network routing: a clean-slate approach
The deployment of sensor networks in security- and safety-critical environments requires secure communication primitives. In this paper, we design, implement, and evaluate a new s...
Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
15 years 8 months ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys