Sciweavers

503 search results - page 11 / 101
» Authenticity by tagging and typing
Sort
View
SWAP
2007
13 years 8 months ago
Towards Social Semantic Suggestive Tagging
The organization of the knowledge on the web is increasingly becoming a social task performed by online communities whose members share a common interest in classifying different t...
Fabio Calefato, Domenico Gendarmi, Filippo Lanubil...
ESAS
2004
Springer
14 years 27 days ago
Exploring Message Authentication in Sensor Networks
Abstract. This paper explores the design space for message authentication in sensor networks. Several types of authentication are put into relation: end-to-end, hop-to-hop, and phy...
Harald Vogt
NTMS
2008
IEEE
14 years 1 months ago
On the Authentication of RFID Systems with Bitwise Operations
—Due to the stringent computational capabilities of low-cost RFID tags, many lightweight authentication protocols have been proposed recently aiming to achieve secure authenticat...
Basel Alomair, Radha Poovendran
IFIP
2010
Springer
13 years 2 months ago
Secrecy and Authenticity Types for Secure Distributed Messaging
Abstract. We introduce a calculus with mobile names, distributed principals and primitives for secure remote communication, without any reference to explicit cryptography. The calc...
Michele Bugliesi, Stefano Calzavara, Damiano Maced...
CCS
2008
ACM
13 years 9 months ago
Mutual authentication in RFID: security and privacy
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...
Radu-Ioan Paise, Serge Vaudenay