Sciweavers

2429 search results - page 256 / 486
» Using Aspects to Design a Secure System
Sort
View
ESORICS
2010
Springer
15 years 4 months ago
A New Framework for RFID Privacy
Formal RFID security and privacy frameworks are fundamental to the design and analysis of robust RFID systems. In this paper, we develop a new definitional framework for RFID priv...
Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 9 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
99
Voted
CCS
2003
ACM
15 years 8 months ago
Print signatures for document authentication
We present a novel solution for authenticating printed paper documents by utilizing the inherent non–repeatable randomness existing in the printing process. For a document print...
Baoshi Zhu, Jiankang Wu, Mohan S. Kankanhalli
124
Voted
EUROSYS
2006
ACM
16 years 12 days ago
Using queries for distributed monitoring and forensics
Distributed systems are hard to build, profile, debug, and test. Monitoring a distributed system – to detect and analyze bugs, test for regressions, identify fault-tolerance pr...
Atul Singh, Petros Maniatis, Timothy Roscoe, Peter...
JUCS
2002
109views more  JUCS 2002»
15 years 3 months ago
On Second Generation Distributed Component Systems
Abstract: Two of today's most used buzz-words in the context of software development are the terms Componentware and Distributed Object-System. The combination of both ideas i...
Klaus Schmaranz