Sciweavers

468 search results - page 31 / 94
» Security Weaknesses in Bluetooth
Sort
View
IJSN
2007
94views more  IJSN 2007»
13 years 7 months ago
On security proof of McCullagh?Barreto's key agreement protocol and its variants
: McCullagh and Barreto presented an identity-based authenticated key agreement protocol in CT-RSA 2005. Their protocol was found to be vulnerable to a key-compromise impersonation...
Zhaohui Cheng, Liqun Chen
JSS
2007
79views more  JSS 2007»
13 years 7 months ago
Security problems with improper implementations of improved FEA-M
This paper reports security problems with improper implementations of an improved version of FEA-M (fast encryption algorithm for multimedia). It is found that an implementation-d...
Shujun Li, Kwok-Tung Lo
CASSIS
2004
Springer
14 years 28 days ago
Modelling Mobility Aspects of Security Policies
Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increa...
Pieter H. Hartel, Pascal van Eck, Sandro Etalle, R...
CORR
2008
Springer
135views Education» more  CORR 2008»
13 years 7 months ago
Crossing Borders: Security and Privacy Issues of the European e-Passport
The first generation of European e-passports will be issued in 2006. We discuss how borders are crossed regarding the security and privacy erosion of the proposed schemes, and show...
Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs,...
JSAC
2006
121views more  JSAC 2006»
13 years 7 months ago
Secure localization and authentication in ultra-wideband sensor networks
The recent Federal Communications Commission regulations for ultra-wideband (UWB) transmission systems have sparked a surge of research interests in the UWB technology. One of the ...
Yanchao Zhang, Wei Liu, Yuguang Fang, Dapeng Wu