Sciweavers

1190 search results - page 89 / 238
» Secure off-the-record messaging
Sort
View
IJISEC
2010
121views more  IJISEC 2010»
15 years 3 months ago
Flowchart description of security primitives for controlled physical unclonable functions
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable and that behave like a random function when subjected to a challenge. Their use h...
Boris Skoric, Marc X. Makkes
IPPS
2007
IEEE
15 years 11 months ago
On the Security of Ultrasound as Out-of-band Channel
Ultrasound has been proposed as out-of-band channel for authentication of peer devices in wireless ad hoc networks. Ultrasound can implicitly contribute to secure communication ba...
Rene Mayrhofer, Hans Gellersen
HUC
2007
Springer
15 years 10 months ago
Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction
Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computing. The aim is to enable users to connect their personal devices with devices en...
Rene Mayrhofer, Hans Gellersen, Mike Hazas
INDOCRYPT
2004
Springer
15 years 10 months ago
On the Security of a Certified E-Mail Scheme
Certified e-mail is a value-added service for standard e-mail systems, in which the intended recipient gets the mail content if and only if the mail originator receives a non-repud...
Guilin Wang, Feng Bao, Jianying Zhou
ACSC
2007
IEEE
15 years 8 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...