Sciweavers

460 search results - page 70 / 92
» Heuristic Methods for Security Protocols
Sort
View
EEE
2005
IEEE
14 years 1 months ago
Who Counts Your Votes?
Open and fair elections are paramount to modern democracy. Although some people claim that the penciland-paper systems used in countries such as Canada and UK are still the best m...
Halina Kaminski, Lila Kari, Mark Perry
WISA
2009
Springer
14 years 5 days ago
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment
We introduce low-cost hardware for performing non-invasive side-channel attacks on Radio Frequency Identication Devices (RFID) and develop techniques for facilitating a correlatio...
Timo Kasper, David Oswald, Christof Paar
BIOSIG
2009
152views Biometrics» more  BIOSIG 2009»
13 years 5 months ago
A Survey of Distributed Biometric Authentication Systems
: In ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionalit...
Neyire Deniz Sarier
APNOMS
2006
Springer
13 years 11 months ago
IP Traceback Algorithm for DoS/DDoS Attack
Abstract. DoS(Denial of Service) / DDoS(Distributed Denial of Service) attacks threaten Internet security nowadays. However, the current Internet protocol and backbone network do n...
Hong-bin Yim, Jae-il Jung
ATVA
2009
Springer
89views Hardware» more  ATVA 2009»
14 years 2 months ago
A Data Symmetry Reduction Technique for Temporal-epistemic Logic
We present a data symmetry reduction approach for model temporal-epistemic logic. The technique abstracts the epistemic indistinguishably relation for the knowledge operators, and ...
Mika Cohen, Mads Dam, Alessio Lomuscio, Hongyang Q...