Sciweavers

2358 search results - page 410 / 472
» A Secure Pervasive Environment
Sort
View
CRYPTO
2011
Springer
222views Cryptology» more  CRYPTO 2011»
12 years 9 months ago
The PHOTON Family of Lightweight Hash Functions
RFID security is currently one of the major challenges cryptography has to face, often solved by protocols assuming that an on-tag hash function is available. In this article we pr...
Jian Guo 0001, Thomas Peyrin, Axel Poschmann
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
12 years 5 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
SOSP
2005
ACM
14 years 6 months ago
THINC: a virtual display architecture for thin-client computing
Rapid improvements in network bandwidth, cost, and ubiquity combined with the security hazards and high total cost of ownership of personal computers have created a growing market...
Ricardo A. Baratto, Leonard N. Kim, Jason Nieh
PDP
2008
IEEE
14 years 4 months ago
System-Level Virtualization for High Performance Computing
System-level virtualization has been a research topic since the 70’s but regained popularity during the past few years because of the availability of efficient solution such as...
Geoffroy Vallée, Thomas Naughton, Christian...
ICC
2007
IEEE
143views Communications» more  ICC 2007»
14 years 4 months ago
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication
Abstract— The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to e...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...