Sciweavers

173 search results - page 27 / 35
» Classification of RFID Attacks
Sort
View
CSE
2008
IEEE
13 years 10 months ago
ACN: An Associative Classifier with Negative Rules
Classification using association rules has added a new dimension to the ongoing research for accurate classifiers. Over the years, a number of associative classifiers based on pos...
Gourab Kundu, Md. Monirul Islam, Sirajum Munir, Md...
CSCW
2008
ACM
13 years 10 months ago
Social networks and context-aware spam
Social networks are popular for online communities. This paper evaluates the risk of sophisticated context-aware spam that could result from information sharing on social networks...
Garrett Brown, Travis Howe, Micheal Ihbe, Atul Pra...
CHES
2006
Springer
87views Cryptology» more  CHES 2006»
14 years 16 days ago
Templates vs. Stochastic Methods
Template Attacks and the Stochastic Model provide advanced methods for side channel cryptanalysis that make use of `a-priori' knowledge gained from a profiling step. For a sys...
Benedikt Gierlichs, Kerstin Lemke-Rust, Christof P...
ISLPED
2010
ACM
170views Hardware» more  ISLPED 2010»
13 years 9 months ago
Low-power sub-threshold design of secure physical unclonable functions
The unique and unpredictable nature of silicon enables the use of physical unclonable functions (PUFs) for chip identification and authentication. Since the function of PUFs depen...
Lang Lin, Daniel E. Holcomb, Dilip Kumar Krishnapp...
ESORICS
2012
Springer
11 years 11 months ago
Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data
In certain applications, it is important for a remote server to securely determine whether or not two mobile devices are in close physical proximity. In particular, in the context ...
Tzipora Halevi, Di Ma, Nitesh Saxena, Tuo Xiang