Sciweavers

503 search results - page 4 / 101
» Authenticity by tagging and typing
Sort
View
EUC
2007
Springer
14 years 1 months ago
HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System
This paper presents a low-cost and secure authentication protocol to reduce the computational load on both the back-end database and the tags in a distributed RFID system. The prop...
JaeCheol Ha, Hwankoo Kim, JeaHoon Park, Sang-Jae M...
TWC
2008
170views more  TWC 2008»
13 years 7 months ago
Secure and Serverless RFID Authentication and Search Protocols
With the increased popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection for users. Most recent RFID proto...
Chiu Chiang Tan, Bo Sheng, Qun Li
POPL
2005
ACM
14 years 7 months ago
Inferring authentication tags
We present PEAR (Protocol Extendable AnalyzeR), a tool automating the two static analyses for authentication protocols presented in [7, 8]. These analyses are based on a tagging s...
Riccardo Focardi, Matteo Maffei, Francesco Placell...
EMNLP
2010
13 years 5 months ago
Simple Type-Level Unsupervised POS Tagging
Part-of-speech (POS) tag distributions are known to exhibit sparsity -- a word is likely to take a single predominant tag in a corpus. Recent research has demonstrated that incorp...
Yoong Keok Lee, Aria Haghighi, Regina Barzilay
ACNS
2008
Springer
172views Cryptology» more  ACNS 2008»
14 years 1 months ago
Traceable Privacy of Recent Provably-Secure RFID Protocols
Abstract. One of the main challenges in RFIDs is the design of privacypreserving authentication protocols. Indeed, such protocols should not only allow legitimate readers to authen...
Khaled Ouafi, Raphael C.-W. Phan