Sciweavers

1564 search results - page 133 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
WMASH
2003
ACM
15 years 9 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
CRYPTO
1997
Springer
156views Cryptology» more  CRYPTO 1997»
15 years 8 months ago
Fast and Secure Hashing Based on Codes
This paper considers hash functions based on block ciphers. It presents a new attack on the compression function of the 128-bit hash function MDC-4 using DES with a complexity far ...
Lars R. Knudsen, Bart Preneel
IFIP
1994
Springer
15 years 8 months ago
Reflections on Security of Database and Datatransfer Systems in Health Care
Health care is a complex and transnational task of societies. The various institutions and individuals involved are not and should not be governed by one central authority, but ha...
Joachim Biskup, Gerrit Bleumer
ACSW
2006
15 years 5 months ago
Formal analysis of secure contracting protocol for e-tendering
Formal specification and verification of protocols have been credited for uncovering protocol flaws; revealing inadequacies in protocol design of the Initial Stage and Negotiation...
Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond...
OPODIS
2004
15 years 5 months ago
Secure Location Verification Using Radio Broadcast
Secure location verification is a recently stated problem that has a number of practical applications. The problem requires a wireless sensor network to confirm that a potentially...
Adnan Vora, Mikhail Nesterenko