Sciweavers

218 search results - page 7 / 44
» Voice-over-IP Security: Research and Practice
Sort
View
ESORICS
2011
Springer
12 years 7 months ago
Remote Timing Attacks Are Still Practical
For over two decades, timing attacks have been an active area of research within applied cryptography. These attacks exploit cryptosystem or protocol implementations that do not ru...
Billy Bob Brumley, Nicola Tuveri
CRYPTO
2005
Springer
144views Cryptology» more  CRYPTO 2005»
14 years 27 days ago
Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes
We investigate several previously suggested scenarios of instantiating random oracles (ROs) with “realizable” primitives in cryptographic schemes. As candidates for such “in...
Alexandra Boldyreva, Marc Fischlin

Tutorial
2179views
15 years 7 months ago
Privacy in Location-Based Services: State-of-the-Art and Research Directions
The explosive growth of location-detection devices (e.g., GPS-like devices and handheld devices) along with wireless communications and mobile databases results in realizing locati...
Mohamed F. Mokbel
AGENTS
2001
Springer
13 years 12 months ago
Specifying agent behavior as concurrent tasks
Software agents are currently the subject of much research in many interrelated fields. Unfortunately, there has not been enough emphasis on defining the techniques required to bu...
Scott A. DeLoach
JCS
2011
87views more  JCS 2011»
13 years 2 months ago
Practical eavesdropping and skimming attacks on high-frequency RFID tokens
RFID systems often use near-field magnetic coupling to implement communication channels. The advertised operational range of these channels is less than 10 cm and therefore sever...
Gerhard P. Hancke