Sciweavers

731 search results - page 27 / 147
» Special Section on Information and Communication System Secu...
Sort
View
CORR
2011
Springer
216views Education» more  CORR 2011»
13 years 3 months ago
Approaches to Formal Verification of Security Protocols
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional cor...
Suvansh Lal, Mohit Jain, Vikrant Chaplot
FOMI
2009
13 years 6 months ago
Do you still want to vote for your favorite politician? Ask Ontobella!
Abstract. The paper presents the preliminary version of Ontobella - a domain ontology of beliefs. The philosophical assumptions of this system are taken from the philosophy of Roma...
Pawel Garbacz, Marek Lechniak, Piotr Kulicki, Robe...
GLVLSI
2007
IEEE
162views VLSI» more  GLVLSI 2007»
14 years 3 months ago
Design of an UHF RFID transponder for secure authentication
RFID technology increases rapidly its applicability in new areas of interest without guaranteeing security and privacy issues. This paper presents a new architecture of an RFID tr...
Paolo Bernardi, Filippo Gandino, Bartolomeo Montru...
ICDS
2009
IEEE
14 years 3 months ago
Security and User Guidelines for the Design of the Future Networked Systems
—Emergence of new networking technologies and paradigms provides users multitude of ways to communicate with each others and exchange information irrespective of time and place. ...
Seppo Heikkinen, Sari Kinnari, Kari Heikkinen
EUROCAST
2007
Springer
108views Hardware» more  EUROCAST 2007»
14 years 2 months ago
A Systems Theoretic Approach to the Design of Scalable Cryptographic Hash Functions
Cryptographic hash functions are security primitives that compute check sums of messages in a strong manner and this way are of fundamental importance for ensuring integrity and au...
Josef Scharinger