Sciweavers

173 search results - page 25 / 35
» Classification of RFID Attacks
Sort
View
SAC
2008
ACM
15 years 2 months ago
Crime scene classification
In this paper we provide a study about crime scenes and its features used in criminal investigations. We argue that the crime scene provides a large set of features that can be us...
Ricardo O. Abu Hana, Cinthia Obladen de Almendra F...
ACSAC
2003
IEEE
15 years 6 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...
CTRSA
2006
Springer
160views Cryptology» more  CTRSA 2006»
15 years 6 months ago
RFID-Tags for Anti-counterfeiting
RFID-tags are becoming very popular tools for identification of products. As they have a small microchip on board, they offer functionality that can be used for security purposes. ...
Pim Tuyls, Lejla Batina
CHES
2010
Springer
189views Cryptology» more  CHES 2010»
15 years 4 months ago
Quark: A Lightweight Hash
The need for lightweight (that is, compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by application designers, notably for implementing RFI...
Jean-Philippe Aumasson, Luca Henzen, Willi Meier, ...
CHI
2009
ACM
16 years 3 months ago
QUICKIES: the future of sticky notes
In this paper, we present `QUICKIES', an attempt to bring one of the most useful inventions of the 20th century into the digital age: the ubiquitous sticky notes. `QUICKIES&#...
Pranav Mistry