Sciweavers

1656 search results - page 37 / 332
» Secure Computation Without Authentication
Sort
View
CIS
2006
Springer
14 years 1 months ago
Security and Privacy on Authentication Protocol for Low-Cost RFID
Yong-Zhen Li, Young-Bok Cho, Nam-Kyoung Um, Sang H...
COMCOM
2011
13 years 4 months ago
An RFID secure authentication mechanism in WLAN
Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng, Ha...
GI
2004
Springer
14 years 3 months ago
User Authentication in Sensor Networks
d Abstract) Zinaida Benenson Felix G¨artner Dogan Kesdogan RWTH Aachen, Department of Computer Science, D-52056 Aachen, Germany : If the data collected within a sensor network is ...
Zinaida Benenson, Felix C. Gärtner, Dogan Kes...
IH
2005
Springer
14 years 3 months ago
Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance
Abstract. Information hiding has been studied in many security applications such as authentication, copyright management and digital forensics. In this work, we introduce a new app...
Ashwin Swaminathan, Yinian Mao, Min Wu, Krishnan K...
PERCOM
2005
ACM
14 years 9 months ago
Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments
In pervasive computing environments, service discovery facilitates users to access network services by automating tedious manual configurations. When network services becomes perv...
Feng Zhu, Wei Zhu, Matt W. Mutka, Lionel M. Ni