Sciweavers

860 search results - page 108 / 172
» Uncovering Attacks on Security Protocols
Sort
View
ESORICS
2012
Springer
13 years 13 days ago
Dismantling iClass and iClass Elite
With more than 300 million cards sold, HID iClass is one of the most popular contactless smart cards on the market. It is widely used for access control, secure login and payment s...
Flavio D. Garcia, Gerhard de Koning Gans, Roel Ver...
HPCC
2005
Springer
15 years 3 months ago
Securing the MPLS Control Plane
— In an increasingly hostile environment, the need for security in network infrastructure is stronger than ever, especially for Multi-Protocol Label Switching (MPLS), widely used...
Francesco Palmieri, Ugo Fiore
EUROPKI
2004
Springer
15 years 3 months ago
Flexible and Scalable Public Key Security for SSH
Abstract. A standard tool for secure remote access, the SSH protocol uses publickey cryptography to establish an encrypted and integrity-protected channel with a remote server. How...
Yasir Ali, Sean W. Smith
CCS
2010
ACM
14 years 6 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
CCS
2009
ACM
15 years 2 months ago
On the difficulty of software-based attestation of embedded devices
Device attestation is an essential feature in many security protocols and applications. The lack of dedicated hardware and the impossibility to physically access devices to be att...
Claude Castelluccia, Aurélien Francillon, D...