Sciweavers

461 search results - page 62 / 93
» Developing security protocols by refinement
Sort
View
IEEECGIV
2006
IEEE
14 years 1 months ago
Studying Design Collaboration in DesignWorld: An Augmented 3D Virtual World
New technological developments offer new collaborative design environments to designers. There is a great interest in these new tools however it is clear that we know very little ...
Leman Figen Gül, Mary Lou Maher
OOPSLA
2007
Springer
14 years 2 months ago
Modular typestate checking of aliased objects
Objects often define usage protocols that clients must follow in order for these objects to work properly. Aliasing makes it notoriously difficult to check whether clients and i...
Kevin Bierhoff, Jonathan Aldrich
LISA
2001
13 years 9 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
WISA
2009
Springer
14 years 12 days ago
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment
We introduce low-cost hardware for performing non-invasive side-channel attacks on Radio Frequency Identication Devices (RFID) and develop techniques for facilitating a correlatio...
Timo Kasper, David Oswald, Christof Paar
GLOBECOM
2008
IEEE
14 years 2 months ago
Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs
—The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key m...
Yong Hao, Yu Cheng, Kui Ren