Sciweavers

SEC
2007
13 years 9 months ago
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols
In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and M2 AP, which are recently proposed by Peris-Lopez et ...
Tieyan Li, Guilin Wang
SIS
2008
13 years 9 months ago
New Attack Strategy for the Shrinking Generator
Pino Caballero-Gil, Amparo Fúster-Sabater, ...
SIS
2008
13 years 9 months ago
An Access Control Model for Location based Services
In this paper we propose an access control model for use by a trusted middleware infrastructure, which is part of an architecture that supports the operation of Location Based Serv...
Cameron Ross Dunne, Thibault Candebat, David Gray
SIS
2008
13 years 9 months ago
A Multi-Dimensional Classification for Users of Security Patterns
Michael VanHilst, Eduardo B. Fernández, Fab...
SIS
2008
13 years 9 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...
SICHERHEIT
2008
13 years 9 months ago
A Cryptographic Biometric Authentication System based on Genetic Fingerprints
We specify a system for authentication and key derivation using genetic fingerprints which prevents the recovery of biometric information from data stored for verification. We pre...
Ulrike Korte, Michael Krawczak, Johannes Merkle, R...
SICHERHEIT
2008
13 years 9 months ago
Implications of the EU Data Retention Directive 2006/24/EC
: The strongly discussed EU Data Retention directive 2006/24/EC released in 2006 requires the operators of publicly accessible electronic communication networks to retain traffic a...
Gerald Stampfel, Wilfried N. Gansterer, Martin Ilg...