Sciweavers

2365 search results - page 432 / 473
» All things are connected
Sort
View
SP
2010
IEEE
226views Security Privacy» more  SP 2010»
15 years 8 months ago
Chip and PIN is Broken
—EMV is the dominant protocol used for smart card payments worldwide, with over 730 million cards in circulation. Known to bank customers as “Chip and PIN”, it is used in Eur...
Steven J. Murdoch, Saar Drimer, Ross J. Anderson, ...
ACSC
2004
IEEE
15 years 8 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald
APPROX
2006
Springer
105views Algorithms» more  APPROX 2006»
15 years 8 months ago
Space Complexity vs. Query Complexity
Abstract. Combinatorial property testing deals with the following relaxation of decision problems: Given a fixed property and an input x, one wants to decide whether x satisfies th...
Oded Lachish, Ilan Newman, Asaf Shapira
CRYPTO
2006
Springer
119views Cryptology» more  CRYPTO 2006»
15 years 8 months ago
Rankin's Constant and Blockwise Lattice Reduction
Abstract Lattice reduction is a hard problem of interest to both publickey cryptography and cryptanalysis. Despite its importance, extremely few algorithms are known. The best algo...
Nicolas Gama, Nick Howgrave-Graham, Henrik Koy, Ph...
EELC
2006
125views Languages» more  EELC 2006»
15 years 8 months ago
How Do Children Develop Syntactic Representations from What They Hear?
nstructional schemas, both specific and abstract. Children are thought to start out with concrete pieces of language and to gradually develop more schematic constructions. All cons...
Elena Lieven