Sciweavers

1770 search results - page 198 / 354
» Writing requirements in computer security
Sort
View
161
Voted
ESORICS
2012
Springer
13 years 6 months ago
Dismantling iClass and iClass Elite
With more than 300 million cards sold, HID iClass is one of the most popular contactless smart cards on the market. It is widely used for access control, secure login and payment s...
Flavio D. Garcia, Gerhard de Koning Gans, Roel Ver...
WISEC
2009
ACM
15 years 10 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
114
Voted
CRYPTO
2007
Springer
99views Cryptology» more  CRYPTO 2007»
15 years 9 months ago
Practical Cryptanalysis of SFLASH
In this paper, we present a practical attack on the signature scheme SFLASH proposed by Patarin, Goubin and Courtois in 2001 following a design they had introduced in 1998. The att...
Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Ja...
ICICS
2005
Springer
15 years 9 months ago
Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails
Efficiently protecting the privacy of multi-recipient emails is not as trivial as it seems. The approach proposed by S/MIME is to concatenate all ciphertexts. However, it suffers ...
Wei Wei, Xuhua Ding, Kefei Chen
148
Voted
IPPS
2002
IEEE
15 years 8 months ago
Research and Design of a Middleware for Supporting Wide-Area Distributed Applications
As the platform for wide-area distributed applications, the middleware architecture should support adaptability, scalability, mobility, reliability and security. However, current ...
Dong Zhao, Shaowen Yao, Mingtian Zhou