Sciweavers

1323 search results - page 67 / 265
» Updatable Security Views
Sort
View
WISTP
2010
Springer
14 years 5 months ago
Security Analysis of Mobile Phones Used as OTP Generators
Abstract. The Norwegian company Encap has developed protocols enabling individuals to use their mobile phones as one-time password (OTP) generators. An initial analysis of the prot...
Håvard Raddum, Lars Hopland Nestås, Kj...
ICC
2008
IEEE
141views Communications» more  ICC 2008»
14 years 4 months ago
Secure Group-Based Information Sharing in Mobile Ad Hoc Networks
Abstract—Secure multicast has become an important component of many applications in wireless networks. In this paper, we investigate secure intra and inter group information shar...
Weichao Wang, Yu Wang 0003
RECONFIG
2008
IEEE
156views VLSI» more  RECONFIG 2008»
14 years 4 months ago
Forward-Secure Content Distribution to Reconfigurable Hardware
Confidentiality and integrity of bitstreams and authenticated update of FPGA configurations are fundamental to trusted computing on reconfigurable technology. In this paper, we pr...
David Champagne, Reouven Elbaz, Catherine H. Gebot...
COMCOM
2011
13 years 5 months ago
Scalable RFID security protocols supporting tag ownership transfer
We identify privacy, security and performance requirements for RFID protocols, as well as additional functional requirements such as tag ownership transfer. Many previously propos...
Boyeon Song, Chris J. Mitchell
HICSS
2010
IEEE
153views Biometrics» more  HICSS 2010»
14 years 4 months ago
Securing E-Government Assets through Automating Deployment of Honeynets for IDS Support
One of the challenges facing system e-government security professionals is the laborious task of sifting through numerous log files in an attempt to identify malicious traffic and...
Christopher Hecker, Brian Hay