We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 521-533 of 533 results
  1. RFID Anticounterfeiting: An Architectural Perspective

    Counterfeit goods have always been an enormous threat to the world economy, but they could potentially be combatted by employing an emerging...
    Tieyan Li, Tong-Lee Lim in RFID Security
    Chapter 2008
  2. Public-Key Cryptography for RFID Tags and Applications

    RFID tags are small wireless devices expected to be pervasive in the future. In addition to their rigorous constraints featuring an extremely...
    Lejla Batina, Jorge Guajardo, ... Ingrid Verbauwhede in RFID Security
    Chapter 2008
  3. Scalability Issues in Privacy-Compliant RFID Protocols

    Like all growing technologies, radio frequency identification brings along its share of security-related problems. Such problems are impersonation of...
    Gildas Avoine in RFID Security
    Chapter 2008
  4. Improving Throughput

    With the rise of the Internet, demand has dramatically increased for servers capable of handling a multitude of independent requests arriving rapidly...
    Kunle Olukotun, Lance Hammond, James Laudon in Chip Multiprocessor Architecture
    Chapter 2007
  5. A Novel Distributed Privacy Paradigm for Visual Sensor Networks Based on Sharing Dynamical Systems

    Visual sensor networks (VSNs) provide surveillance images/video which must be protected from eavesdrop** and tampering en route to the base...

    William Luh, Deepa Kundur, Takis Zourntos in EURASIP Journal on Advances in Signal Processing
    Article Open access 01 December 2006
  6. Provable Cryptographic Security and its Applications to Mobile Wireless Computing

    Many attempts to secure mobile wireless systems have failed abysmally. Notable examples include 802.11 WEP, as well as major cellular phone standards...

    Craig Gentry, Zulfikar Ramzan in Wireless Personal Communications
    Article 01 June 2004
  7. On Securing Real-Time Speech Transmission over the Internet: An Experimental Study

    We analyze and compare several soft real-time applications designed for the secure transmission of packetized audio over the Internet. The main...

    Alessandro Aldini, Marco Roccetti, Roberto Gorrieri in EURASIP Journal on Advances in Signal Processing
    Article 08 September 2003
  8. Domain Specific Tools and Methods for Application in Security Processor Design

    Security processors are used to implement cryptographic algorithmswith high throughput and/or low energy consumption constraints. The designof these...

    Patrick Schaumont, Ingrid Verbauwhede in Design Automation for Embedded Systems
    Article 01 November 2002
  9. SPINS: Security Protocols for Sensor Networks

    Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful,...

    Adrian Perrig, Robert Szewczyk, ... David E. Culler in Wireless Networks
    Article 01 September 2002
  10. Neue Entwicklungen im Internet-Umfeld

    In diesem Kapitel werden die aktuellen Entwicklungen und Protokollvorschläge vorgestellt und analysiert, die in Anbetracht der Sicherheitsprobleme...
    Chapter 2000
Did you find what you were looking for? Share feedback.