Sciweavers

300 search results - page 9 / 60
» Lightweight secure PUFs
Sort
View
CCS
2009
ACM
13 years 12 months ago
On lightweight mobile phone application certification
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of appli...
William Enck, Machigar Ongtang, Patrick Drew McDan...
IADIS
2004
13 years 9 months ago
Analysis of Java-Based End-to-End Wireless Internet Security
The third and fourth generation wireless devices will require increasingly End
Larry Hughes, Abdul-Kadhim Hay'awi
WWW
2002
ACM
14 years 8 months ago
A lightweight protocol for the generation and distribution of secure e-coupons
Carlo Blundo, Stelvio Cimato, Annalisa De Bonis
SIGSOFT
2007
ACM
14 years 8 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
ASM
2010
ASM
14 years 5 months ago
Lightweight Modeling of Java Virtual Machine Security Constraints
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly i...
Mark C. Reynolds