Sciweavers

1180 search results - page 172 / 236
» Interaction Protocols in Agentis
Sort
View
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
15 years 9 months ago
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies
Power analysis is a very successful cryptanalytic technique which extracts secret information from smart cards by analysing the power consumed during the execution of their interna...
Adi Shamir
CSCW
1998
ACM
15 years 8 months ago
Artefact: A Framework for Low-Overhead Web-Based Collaborative Systems
The Artefact framework supports collaborative applications using standard browsers, a lightweight general-purpose Java applet, and HTML representations of objects and actions. We ...
Jeff Brandenburg, Boyce Byerly, Tom Dobridge, Jink...
151
Voted
PKC
1998
Springer
135views Cryptology» more  PKC 1998»
15 years 8 months ago
A Signcryption Scheme with Signature Directly Verifiable by Public Key
Signcryption, first proposed by Zheng [4,5], is a cryptographic primitive which combines both the functions of digital signature and public key encryption in a logical single step,...
Feng Bao, Robert H. Deng
CNSR
2010
IEEE
145views Communications» more  CNSR 2010»
15 years 8 months ago
Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks
We address security solutions to protect the communication of the wireless components of a home health care system. We analyze especially the problem of exchanging secrets to sati...
Wiem Tounsi, Joaquín García-Alfaro, ...
ICC
2007
IEEE
15 years 8 months ago
Towards an Integrated Design Approach to Specknets
The Research Consortium in Speckled Computing is a multidisciplinary grouping of computer scientists, electronic engineers, physicists and electrochemists with the aim of realising...
D. K. Arvind, K. Elgaid, T. Krauss, A. Paterson, R...