Sciweavers

849 search results - page 90 / 170
» Secure Applications of Low-Entropy Keys
Sort
View
CARDIS
2008
Springer
153views Hardware» more  CARDIS 2008»
14 years 3 days ago
Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents
In recent years more and more security sensitive applications use passive smart devices such as contactless smart cards and RFID tags. Cost constraints imply a small hardware footp...
Carsten Rolfes, Axel Poschmann, Gregor Leander, Ch...
KDD
2005
ACM
73views Data Mining» more  KDD 2005»
14 years 10 months ago
Using relational knowledge discovery to prevent securities fraud
We describe an application of relational knowledge discovery to a key regulatory mission of the National Association of Securities Dealers (NASD). NASD is the world's largest...
Özgür Simsek, David Jensen, Henry G. Gol...
ASIACRYPT
2006
Springer
14 years 1 months ago
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensively studied in the literature over the last 25 years. These generators have the a...
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
ISSA
2008
13 years 11 months ago
The Information Security of a Bluetooth-Enabled Handheld Device
Bluetooth connectivity allows workers to access information anywhere, including both personal and corporate information. Software and applications have been specifically developed...
Frankie Tvrz, Marijke Coetzee
PERVASIVE
2009
Springer
14 years 4 months ago
Securing RFID Systems by Detecting Tag Cloning
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...