Sciweavers

3482 search results - page 192 / 697
» Designing for security
Sort
View
ACNS
2008
Springer
172views Cryptology» more  ACNS 2008»
14 years 3 months ago
Traceable Privacy of Recent Provably-Secure RFID Protocols
Abstract. One of the main challenges in RFIDs is the design of privacypreserving authentication protocols. Indeed, such protocols should not only allow legitimate readers to authen...
Khaled Ouafi, Raphael C.-W. Phan
DSD
2006
IEEE
113views Hardware» more  DSD 2006»
14 years 3 months ago
An Asynchronous PLA with Improved Security Characteristics
Programmable logic arrays (PLAs) present an alternative to logic-gate based design. We propose the transistor level structure of a PLA for single-rail asynchronous applications. T...
Petros Oikonomakos, Simon W. Moore
IWCMC
2006
ACM
14 years 3 months ago
Security aspects of inter-satellite links using neural networks
This paper presents a neural network model for routing in the space segment of a Satellite Personal Communication System. At first, a proper energy function is constructed from th...
Peter P. Stavroulakis, Ioannis Dimou, Harilaos G. ...
ITRE
2005
IEEE
14 years 2 months ago
Integrated use of Web technologies to deliver a secure collaborative Web portal
This paper describes the design and operation of the OMII web site, which has to date achieved three major targets. The first target is the successful integrations in different te...
Victor Chang
FM
2005
Springer
125views Formal Methods» more  FM 2005»
14 years 2 months ago
End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform
Abstract. We present a software tool platform which facilitates security and performance analysis of systems which starts and ends with UML model descriptions. A UML project is pre...
Mikael Buchholtz, Stephen Gilmore, Valentin Haenel...