Sciweavers

623 search results - page 74 / 125
» Side-Channel Issues for Designing Secure Hardware Implementa...
Sort
View
NDSS
1998
IEEE
15 years 8 months ago
On the Problem of Trust in Mobile Agent Systems
Systems that support mobile agents are increasingly being used on the global Internet. Security concerns dealing with the protection of the execution environment from malicious ag...
Uwe G. Wilhelm, Sebastian Staamann, Levente Butty&...
124
Voted
ESCIENCE
2006
IEEE
15 years 7 months ago
Remote Control of Web 2.0-Enabled Laboratories from Mobile Devices
The design of WebLabs has traditionally been focused on the hardware rather than the software side. However, paying more importance to the software side can bring about important ...
Diego López de Ipiña, Javier Garc&ia...
USS
2008
15 years 6 months ago
NetAuth: Supporting User-Based Network Services
In User-Based Network Services (UBNS), the process servicing requests from user U runs under U's ID. This enables (operating system) access controls to tailor service authori...
Manigandan Radhakrishnan, Jon A. Solworth
ASYNC
2005
IEEE
174views Hardware» more  ASYNC 2005»
15 years 9 months ago
Delay Insensitive Encoding and Power Analysis: A Balancing Act
Unprotected cryptographic hardware is vulnerable to a side-channel attack known as Differential Power Analysis (DPA). This attack exploits data-dependent power consumption of a co...
Konrad J. Kulikowski, Ming Su, Alexander B. Smirno...
NETWORKING
2007
15 years 5 months ago
Privacy-Aware Multi-Context RFID Infrastructure Using Public Key Cryptography
We propose a novel approach in designing an RFID infrastructure which foresees the usage of a single RFID tag within different contexts and for multiple purposes. We regard privacy...
Selim Volkan Kaya, Erkay Savas, Albert Levi, Ö...