-
1
-
-
33750306082
-
-
Schlage, "History of Locks," available at http://professional. schlage.com/about_us_historyoflocks.asp.
-
History of Locks
-
-
-
2
-
-
3042704844
-
Rights amplification in master-keyed mechanical locks
-
M. Blaze, "Rights Amplification in Master-Keyed Mechanical Locks," IEEE SECURITY & PRIVACY, vol. 1, pp. 24-32, 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, pp. 24-32
-
-
Blaze, M.1
-
3
-
-
0036949148
-
Zero-interaction authentication
-
Atlanta, Georgia, USA
-
M. Corner and B. Noble, "Zero-Interaction Authentication," presented at Conference on Mobile Computing and Networking (MobiCom), Atlanta, Georgia, USA, 2002.
-
(2002)
Conference on Mobile Computing and Networking (MobiCom)
-
-
Corner, M.1
Noble, B.2
-
4
-
-
33750284112
-
Introduction to magnetic stripe & other card technologies
-
Singapore
-
S. G. Halliday, "Introduction to Magnetic Stripe & Other Card Technologies," presented at SCAN-TECH ASIA 97, Singapore, 1997.
-
(1997)
SCAN-TECH ASIA 97
-
-
Halliday, S.G.1
-
5
-
-
33750297287
-
-
Association for Payment Clearing Services, "UK CARD FRAUD LOSSES REACH £504.8M," 2005, available at http://www.epaynews.com/downloads/ APACS%20UK%20Card%20Fraud%20PR%208%20March%202005.pdf.
-
(2005)
UK Card Fraud Losses Reach£504.8M
-
-
-
7
-
-
33750291681
-
-
Smart Card Alliance, "Smart Card Implementation Profiles," available at http://www.smartcardalliance.org/industry_info/profiles.cfm.
-
Smart Card Implementation Profiles
-
-
-
9
-
-
33750308408
-
-
AXCESS Inc web site, "Personnel Access Control," 2005, available at http://www.axcessinc.com/.
-
(2005)
Personnel Access Control
-
-
-
11
-
-
21144438831
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Boppard, Germany
-
S. A. Weis, S. Sarma, R. Rivest, and D. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," presented at 1st International Conference on Security in Pervasive Computing, Boppard, Germany, 2003.
-
(2003)
1st International Conference on Security in Pervasive Computing
-
-
Weis, S.A.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
12
-
-
33750324038
-
-
P. Agrawal, N. Bhargava, C. Chandrasekhar, A. Dahya, and J. D. Zamfirescu, "The MIT ID Card System: Analysis and Recommendations," 2004, available at http://swiss.csail.mit.edu/6.805/student-papers/fall04- papers/mit_id/.
-
(2004)
The MIT ID Card System: Analysis and Recommendations
-
-
Agrawal, P.1
Bhargava, N.2
Chandrasekhar, C.3
Dahya, A.4
Zamfirescu, J.D.5
-
15
-
-
33750329811
-
-
iButton home page, 2005, available at http://www.maxim-ic.com/products/ ibutton/.
-
(2005)
IButton Home Page
-
-
-
16
-
-
27244436587
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
Cambridge, MA
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, "Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs," presented at Workshop on Cryptographic Hardware and Embedded Systems, Cambridge, MA, 2004.
-
(2004)
Workshop on Cryptographic Hardware and Embedded Systems
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
17
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
Kauai island, Hawaii
-
A. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, "Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks," presented at 3rd IEEE Annual Conference on Pervasive Computing and Communications, Kauai island, Hawaii, 2005.
-
(2005)
3rd IEEE Annual Conference on Pervasive Computing and Communications
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
18
-
-
33750343487
-
Tiny wireless sensors are poised for market
-
M. Prince, "Tiny Wireless Sensors Are Poised for Market," in The Wall Street Journal, 2003.
-
(2003)
The Wall Street Journal
-
-
Prince, M.1
-
19
-
-
0028322851
-
A distributed location system for the active office
-
A. Harter and A. Hopper, "A Distributed Location System for the Active Office," IEEE Network, vol. 8, 1994.
-
(1994)
IEEE Network
, vol.8
-
-
Harter, A.1
Hopper, A.2
-
20
-
-
33750334988
-
-
Ensure Technologies, available at http://www.ensuretech.com/products/ technology/technology.html#HowXyLocWorks.
-
-
-
-
21
-
-
0742302036
-
Biometric recognition: Security and privacy concerns
-
S. Prabhakar, S. Pankanti, and A. Jain, "Biometric Recognition: Security and Privacy Concerns," IEEE SECURITY & PRIVACY, vol. MARCH/APRIL, 2003.
-
(2003)
IEEE Security & Privacy
, vol.MARCH-APRIL
-
-
Prabhakar, S.1
Pankanti, S.2
Jain, A.3
-
22
-
-
2642523653
-
PrudentExposure: A private and user-centric service discovery protocol
-
Orlando, Florida
-
F. Zhu, M. Mutka, and L. Ni, "PrudentExposure: A Private and User-centric Service Discovery Protocol," presented at 2nd IEEE Annual Conference on Pervasive Computing and Communications, Orlando, Florida, 2004.
-
(2004)
2nd IEEE Annual Conference on Pervasive Computing and Communications
-
-
Zhu, F.1
Mutka, M.2
Ni, L.3
-
23
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. Bloom, "Space/Time Trade-offs in Hash Coding with Allowable Errors," Communications of ACM, pp. 422-426, 1970.
-
(1970)
Communications of ACM
, pp. 422-426
-
-
Bloom, B.1
-
24
-
-
70450232823
-
Network applications of bloom filters: A survey
-
A. Broder and M. Mitzenmacher, "Network Applications of Bloom Filters: A Survey," Internet Mathematics, vol. 1, 2005.
-
(2005)
Internet Mathematics
, vol.1
-
-
Broder, A.1
Mitzenmacher, M.2
-
25
-
-
33244488406
-
-
E.-J. Goh, "Secure Indexes," 2004, available at http://crypto.stanford.edu/~eujin/papers/secureindex/index.html.
-
(2004)
Secure Indexes
-
-
Goh, E.-J.1
-
30
-
-
0034206002
-
Summary cache: A scalable wide-area web cache sharing protocol
-
L. Fan, P. Cao, J. Almeida, and A. Broder, "Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol," IEEE/ACM TRANSACTIONS ON NETWORKING, vol. 8, pp. 281-293, 2000.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, pp. 281-293
-
-
Fan, L.1
Cao, P.2
Almeida, J.3
Broder, A.4
-
31
-
-
0013398251
-
Major security problems with the 'unforgeable' (feige)-fiat-shamir proofs of identity and how to overcome them
-
Paris, France
-
Y. Desmedt, "Major security problems with the 'unforgeable' (feige)-fiat-shamir proofs of identity and how to overcome them," presented at SecuriCom'88, Paris, France, 1988.
-
(1988)
SecuriCom'88
-
-
Desmedt, Y.1
-
32
-
-
0013433454
-
Identification tokens - Or: Solving the chess grandmaster problem
-
T. Beth and Y. Desmedt, "Identification tokens - or: Solving the chess grandmaster problem," presented at Advances in Cryptology Crypto '90, 1991.
-
(1991)
Advances in Cryptology Crypto '90
-
-
Beth, T.1
Desmedt, Y.2
-
34
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
San Francisco, CA
-
Y.-C. Hu, A. Perrig, and D. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks," presented at 22nd Annual Joint Conference of IEEE Computer and Communication Societies (INFOCOM 2003), San Francisco, CA, 2003.
-
(2003)
22nd Annual Joint Conference of IEEE Computer and Communication Societies (INFOCOM 2003)
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.3
-
35
-
-
17644398259
-
Secure object identification: Or: solving the Chess Grandmaster Problem
-
Ascona, Switzerland
-
A. Alkassar, C. Stable, and A.-R. Sadeghi, "Secure object identification: or: solving the Chess Grandmaster Problem," presented at the 2003 workshop on New security paradigms, Ascona, Switzerland, 2003.
-
(2003)
2003 Workshop on New Security Paradigms
-
-
Alkassar, A.1
Stable, C.2
Sadeghi, A.-R.3
|