Sciweavers

385 search results - page 57 / 77
» Advances in smart cards
Sort
View
SP
2003
IEEE
14 years 1 months ago
Using Memory Errors to Attack a Virtual Machine
We present an experimental study showing that soft memory errors can lead to serious security vulnerabilities in Java and .NET virtual machines, or in any system that relies on ty...
Sudhakar Govindavajhala, Andrew W. Appel
FSE
2003
Springer
134views Cryptology» more  FSE 2003»
14 years 1 months ago
A New Class of Collision Attacks and Its Application to DES
Until now in cryptography the term collision was mainly associated with the surjective mapping of different inputs to an equal output of a hash function. Previous collision attack...
Kai Schramm, Thomas J. Wollinger, Christof Paar
CARDIS
2000
Springer
150views Hardware» more  CARDIS 2000»
14 years 11 days ago
How to Turn a GSM SIM into a Web Server
: We describe the WebSIM, an approach that integrates GSM SIMs into the Internet. The underlying idea is to implement a Web Server inside a SIM, and to allow for transparent access...
Scott B. Guthery, Roger Kehr, Joachim Posegga
ACSAC
1999
IEEE
14 years 10 days ago
Safe Areas of Computation for Secure Computing with Insecure Applications
Currently the computer systems and software used by the average user offer virtually no security. Because of this many attacks, both simulated and real, have been described by the...
André L. M. dos Santos, Richard A. Kemmerer
NDSS
1999
IEEE
14 years 9 days ago
Secure Password-Based Protocol for Downloading a Private Key
We present protocols that allow a user Alice, knowing only her name and password, and not carrying a smart card, to "log in to the network" from a "generic" wo...
Radia J. Perlman, Charlie Kaufman