Search
Search Results
-
RFID Anticounterfeiting: An Architectural Perspective
Counterfeit goods have always been an enormous threat to the world economy, but they could potentially be combatted by employing an emerging... -
-
Public-Key Cryptography for RFID Tags and Applications
RFID tags are small wireless devices expected to be pervasive in the future. In addition to their rigorous constraints featuring an extremely... -
Scalability Issues in Privacy-Compliant RFID Protocols
Like all growing technologies, radio frequency identification brings along its share of security-related problems. Such problems are impersonation of... -
-
-
Improving Throughput
With the rise of the Internet, demand has dramatically increased for servers capable of handling a multitude of independent requests arriving rapidly... -
A Novel Distributed Privacy Paradigm for Visual Sensor Networks Based on Sharing Dynamical Systems
Visual sensor networks (VSNs) provide surveillance images/video which must be protected from eavesdrop** and tampering en route to the base...
-
Provable Cryptographic Security and its Applications to Mobile Wireless Computing
Many attempts to secure mobile wireless systems have failed abysmally. Notable examples include 802.11 WEP, as well as major cellular phone standards...
-
On Securing Real-Time Speech Transmission over the Internet: An Experimental Study
We analyze and compare several soft real-time applications designed for the secure transmission of packetized audio over the Internet. The main...
-
Domain Specific Tools and Methods for Application in Security Processor Design
Security processors are used to implement cryptographic algorithmswith high throughput and/or low energy consumption constraints. The designof these...
-
SPINS: Security Protocols for Sensor Networks
Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful,...
-
Neue Entwicklungen im Internet-Umfeld
In diesem Kapitel werden die aktuellen Entwicklungen und Protokollvorschläge vorgestellt und analysiert, die in Anbetracht der Sicherheitsprobleme...