Sciweavers

113 search results - page 14 / 23
» Attacks on physical-layer identification
Sort
View
PERCOM
2006
ACM
14 years 8 months ago
On Authentication between Human and Computer
Electronic authentication with a portable device such as a smart card has been receiving increasing attention. An explosion of papers argues security on such kind of authenticatio...
Takahiro Watanabe, Yasunobu Nohara, Kensuke Baba, ...
IMA
1995
Springer
97views Cryptology» more  IMA 1995»
14 years 4 days ago
A New Algorithm for Finding Minimum-Weight Words in Large Linear Codes
An algorithm for finding small-weight words in large linear codes is developed and a precise analysis of its complexity is given. It is in particular able to decode random [512,256...
Anne Canteaut
APWEB
2007
Springer
14 years 2 months ago
Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags
How can a RFID (Radio Frequency Identification Devices) system prove that two or more RFID tags are in the same location? Previous researchers have proposed yoking-proof and groupi...
Chih-Chung Lin, Yuan-Cheng Lai, J. D. Tygar, Chuan...
PDCAT
2005
Springer
14 years 2 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
CORR
2010
Springer
159views Education» more  CORR 2010»
13 years 8 months ago
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode tech...
Eslam Gamal Ahmed, Eman Shaaban, Mohamed Hashem