Sciweavers

239 search results - page 21 / 48
» Accountable Privacy
Sort
View
IJCAI
2003
14 years 8 days ago
Distributed Clustering Based on Sampling Local Density Estimates
Huge amounts of data are stored in autonomous, geographically distributed sources. The discovery of previously unknown, implicit and valuable knowledge is a key aspect of the expl...
Matthias Klusch, Stefano Lodi, Gianluca Moro
WISTP
2010
Springer
14 years 5 months ago
Security Analysis of Mobile Phones Used as OTP Generators
Abstract. The Norwegian company Encap has developed protocols enabling individuals to use their mobile phones as one-time password (OTP) generators. An initial analysis of the prot...
Håvard Raddum, Lars Hopland Nestås, Kj...
IEEEARES
2009
IEEE
14 years 5 months ago
Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones
Near Field Communication (NFC)-enabled mobile phones and services are starting to appear in the field, yet no attempt was made to analyze the security of NFC-enabled mobile phone...
Collin Mulliner
MOBISEC
2009
Springer
14 years 5 months ago
SAVAH: Source Address Validation with Host Identity Protocol
Explosive growth of the Internet and lack of mechanisms that validate the authenticity of a packet source produced serious security and accounting issues. In this paper, we propose...
Dmitriy Kuptsov, Andrei Gurtov
WISA
2004
Springer
14 years 4 months ago
Secure and Efficient AES Software Implementation for Smart Cards
In implementing cryptographic algorithms on limited devices such as smart cards, speed and memory optimization had always been a challenge. With the advent of side channel attacks,...
Elena Trichina, Lesya Korkishko