Sciweavers

WISA
2007
Springer
14 years 1 months ago
Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations
Abstract. The hash algorithm forms the basis of many popular cryptographic protocols and it is therefore important to find throughput optimal implementations. Though there have be...
Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede
WISA
2007
Springer
14 years 1 months ago
Breaking 104 Bit WEP in Less Than 60 Seconds
We demonstrate an active attack on the WEP protocol that is able to recover a 104-bit WEP key using less than 40,000 frames with a success probability of 50%. In order to succeed i...
Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin
TRUSTBUS
2007
Springer
14 years 1 months ago
Recognition of Authority in Virtual Organisations
Abstract. A Virtual Organisation (VO) is a temporary alliance of autonomous, diverse, and geographically dispersed organisations, where the participants pool resources, information...
Tuan-Anh Nguyen, David W. Chadwick, Bassem Nasser
TRUSTBUS
2007
Springer
14 years 1 months ago
Securing VO Management
Abstract. In this paper we propose a security architecture and mechanism for Virtual Organizations (VO) for businesses. The VOs we consider are based on web service technology to a...
Florian Kerschbaum, Rafael Deitos, Philip Robinson
TRUSTBUS
2007
Springer
14 years 1 months ago
How to Use ISO/IEC 24727-3 with Arbitrary Smart Cards
The forthcoming ISO/IEC 24727 series of standards defines application programming interfaces for smart cards and is expected to provide a major contribution to the global interope...
Detlef Hühnlein, Manuel Bach
TRUSTBUS
2007
Springer
14 years 1 months ago
Usage Control in Service-Oriented Architectures
Usage control governs the handling of sensitive data after it has been given away. The enforcement of usage control requirements is a challenge because the service requester in gen...
Alexander Pretschner, Fabio Massacci, Manuel Hilty
TRUSTBUS
2007
Springer
14 years 1 months ago
The Meaning of Logs
While logging events is becoming increasingly common in computing, in communication and in collaborative environments, log systems need to satisfy increasingly challenging (if not ...
Sandro Etalle, Fabio Massacci, Artsiom Yautsiukhin
TRUSTBUS
2007
Springer
14 years 1 months ago
On Device-Based Identity Management in Enterprises
Marco Casassa Mont, Boris Balacheff
PET
2007
Springer
14 years 1 months ago
Louis, Lester and Pierre: Three Protocols for Location Privacy
Abstract. Location privacy is of utmost concern for location-based services. It is the property that a person’s location is revealed to other entities, such as a service provider...
Ge Zhong, Ian Goldberg, Urs Hengartner
PET
2007
Springer
14 years 1 months ago
Two-Sided Statistical Disclosure Attack
We introduce a new traffic analysis attack: the Two-sided Statistical Disclosure Attack, that tries to uncover the receivers of messages sent through an anonymizing network support...
George Danezis, Claudia Díaz, Carmela Tronc...