Sciweavers

729 search results - page 56 / 146
» Towards Secure e-Services
Sort
View
IPOM
2009
Springer
14 years 3 months ago
Security Considerations for Intrinsic Monitoring within IPv6 Networks
Abstract. Intrinsic Monitoring is a method of collecting and disseminating node specific monitoring data throughout an IPv6 network by using the IPv6 extension headers as a carrie...
Lei Shi, Alan Davy
IFIP11
2004
110views Business» more  IFIP11 2004»
13 years 10 months ago
A Security Model for Anonymous Credential Systems
This paper proposes a formal model of the Bellare-Rogaway type [1] that enables one to prove the security of an anonymous credential system in a complexity theoretic framework. Th...
Andreas Pashalidis, Chris J. Mitchell
JSAC
2006
100views more  JSAC 2006»
13 years 9 months ago
RFID security and privacy: a research survey
This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help iden...
Ari Juels
SACRYPT
2005
Springer
14 years 2 months ago
Proving the Security of AES Substitution-Permutation Network
In this paper we study the substitution-permutation network (SPN) on which AES is based. We introduce AES∗ , a SPN identical to AES except that fixed S-boxes are replaced by ran...
Thomas Baignères, Serge Vaudenay
CCIA
2009
Springer
13 years 10 months ago
Secure and Optimal Base Contraction in Graded Lukasiewicz Logics
Abstract. The operation of base contraction was successfully characterized for a very general class of logics using the notion of remainder sets. Although, in the general case, thi...
Pere Pardo, Pilar Dellunde, Lluis Godo