Sciweavers

5476 search results - page 41 / 1096
» Resettably Secure Computation
Sort
View
137
Voted
COMPSEC
2006
143views more  COMPSEC 2006»
15 years 3 months ago
A novel approach for computer security education using Minix instructional operating system
To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. In th...
Wenliang Du, Mingdong Shang, Haizhi Xu
137
Voted
PDCAT
2005
Springer
15 years 9 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
GI
2009
Springer
15 years 1 months ago
Sensor Integration in the Security Domain
: The Sensor Integration Package is a reusable subsystem, combining the complementary capabilities of radar, infra red and long range day light camera, laser, image processing soft...
Bastian Köhler, Kaeye Dästner, Felix Opi...
139
Voted
AISM
2004
15 years 5 months ago
Computer Security Research: Approaches and Assumptions
Researchers, no matter their field, are faced with the problem of selecting an appropriate approach before conducting a study. The purpose of this paper is to provide an overview ...
Christopher Bolan, Daniel Mende
182
Voted
TDSC
2011
14 years 10 months ago
On the Security of Chien's Ultralightweight RFID Authentication Protocol
Recently, Chien proposed an ultralightweight RFID authentication protocol to prevent all possible attacks. However, we find two de-synchronization attacks to break the protocol. K...
Hung-Min Sun, Wei-Chih Ting, King-Hang Wang