Sciweavers

5488 search results - page 139 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
CSREASAM
2006
15 years 5 months ago
Efficient and Secure Authentication Protocols for Mobile VoIP Communications
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerabl...
Huang-Ju Chen, Jyh-Ming Huang, Lei Wang
SEC
2004
15 years 5 months ago
An Asymmetric Cryptography Secure Channel Protocol for Smart Cards
: Smart card secure channel protocols based on public key cryptography are not widely utilised mainly due to processing overheads introduced in the underlying smart card microproce...
Konstantinos Rantos, Constantinos Markantonakis
HICSS
2008
IEEE
146views Biometrics» more  HICSS 2008»
15 years 11 months ago
Toward a Generic Model of Security in an Organizational Context: Exploring Insider Threats to Information Infrastructure
This paper presents a generic model for information security implementation in organizations. The model presented here is part of an ongoing research stream related to critical in...
Ignacio J. Martinez-Moyano, Michael E. Samsa, Jame...
MUE
2007
IEEE
120views Multimedia» more  MUE 2007»
15 years 10 months ago
Design and Implementation of Secure Communication Channels over UPnP Networks
The scale of smart living spaces can be varied from small, e.g. a household, to large, e.g. a building or a campus, scales. As the scale of the space increases, we can expect that...
Jiunn-Jye Lee, Chun-Ying Huang, Li-Yuan Lee, Chin-...
INDOCRYPT
2009
Springer
15 years 11 months ago
Two Attacks against the Ff RFID Protocol
This paper investigates a new family of RFID protocols called Ff that grew out of a proposal made at ESORICS 2007. This family has the property of having highly efficient implement...
Olivier Billet, Kaoutar Elkhiyaoui