Sciweavers

329 search results - page 29 / 66
» A Survey of Lightweight-Cryptography Implementations
Sort
View
DCC
2003
IEEE
14 years 7 months ago
On the Security of Digital Signature Schemes Based on Error-Correcting Codes
In this paper we discuss the security of digital signature schemes based on error? correcting codes. Several attacks to the Xinmei scheme are surveyed, and some reasons given to e...
Sheng-Bo Xu, Jeroen Doumen, Henk C. A. van Tilborg
ESORICS
2009
Springer
14 years 2 months ago
Security Threat Mitigation Trends in Low-Cost RFID Systems
Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
Joaquín García-Alfaro, Michel Barbea...
ICC
2009
IEEE
350views Communications» more  ICC 2009»
14 years 2 months ago
A Performance Comparison of Recent Network Simulators
—A widespread methodology for performance analysis in the field of communication systems engineering is network simulation. While ns-2 has established itself as virtually the st...
Elias Weingärtner, Hendrik vom Lehn, Klaus We...
ITICSE
2009
ACM
14 years 2 months ago
Evaluating student experiences in developing software for humanity
Student involvement in Humanitarian Free and Open Source Software (HFOSS) projects holds the potential to provide a rich education experience to undergraduates. This paper discuss...
Gregory W. Hislop, Heidi J. C. Ellis, Ralph A. Mor...
BROADCOM
2008
IEEE
14 years 2 months ago
A Roadmap to Proliferate Open Source Software Usage within SA Government Servers
Open Source software (OSS) is increasingly being recognized by the government sector around the world as a viable choice to proprietary software, particularly in a number of areas...
Jabu Mtsweni, Elmarie Biermann