-
1
-
-
33747304628
-
Is your cat infected with a computer virus?
-
March, Pisa, Italy
-
M. Rieback, B. Crispo, and A. Tanenbaum, "Is Your Cat Infected with a Computer Virus?" Fourth Annual IEEE International Conference on Pervasive Computing and Communications, March 13-17, 2006, Pisa, Italy.
-
(2006)
Fourth Annual IEEE International Conference on Pervasive Computing and Communications
, vol.13-17
-
-
Rieback, M.1
Crispo, B.2
Tanenbaum, A.3
-
2
-
-
0003449736
-
Survivable network systems: An emerging discipline
-
Software Engineering Institute, Carnegie Mellon University
-
R. Ellison, D. Fisher, R. Linger, and H. Lipson, "Survivable Network Systems: An Emerging Discipline", Technical Report CMU/SEI-97-TR-013, Software Engineering Institute, Carnegie Mellon University, 1997.
-
(1997)
Technical Report CMU/SEI-97-TR-013
-
-
Ellison, R.1
Fisher, D.2
Linger, R.3
Lipson, H.4
-
3
-
-
84942246436
-
Towards a rigorous definition of information system survivability
-
April 22-24, Washington, DC, USA
-
J. Knight, E. Strunk, and K. Sullivan, "Towards a Rigorous Definition of Information System Survivability", DARPA Information Survivability Conference and Exposition, April 22- 24, 2003, Washington, DC, USA.
-
(2003)
DARPA Information Survivability Conference and Exposition
-
-
Knight, J.1
Strunk, E.2
Sullivan, K.3
-
4
-
-
33748108997
-
Dependability through assured reconfiguration in embedded systems software
-
July
-
E. Strunk and J. Knight, "Dependability Through Assured Reconfiguration in Embedded Systems Software", IEEE Transactions on Dependable and Secure Computing, Vol.3, No.3, pp. 172-187, July 2006.
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.3
, pp. 172-187
-
-
Strunk, E.1
Knight, J.2
-
5
-
-
0034228685
-
Reliability and survivability of wireless and mobile networks
-
July
-
A. Snow, U. Varshney, and A. Malloy, "Reliability and Survivability of Wireless and Mobile Networks", IEEE Computer, 33(7), pp. 49-55, July 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.7
, pp. 49-55
-
-
Snow, A.1
Varshney, U.2
Malloy, A.3
-
7
-
-
33947538532
-
Protocols for RFID tag/reader authentication
-
S. Piramuthu, "Protocols for RFID Tag/Reader Authentication", Decision Support Systems, (43) pp. 897-914, 2007.
-
(2007)
Decision Support Systems
, vol.43
, pp. 897-914
-
-
Piramuthu, S.1
-
8
-
-
38149056913
-
Strong and robust RFID authentication enabling perfect ownership transfer
-
December 4-7, Raleigh, NC, USA
-
C. Lim, and T. Kwon, "Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer", The 8th Conference on Information and Communications Security, December 4-7, 2006, Raleigh, NC, USA.
-
(2006)
The 8th Conference on Information and Communications Security
-
-
Lim, C.1
Kwon, T.2
-
9
-
-
70349284581
-
Secure human identification protocols
-
C. Boyd (ed.), Lecture Notes in Computer Science, Springer-Verlag
-
N. Hopper, and M. Blum, "Secure Human Identification Protocols", In C. Boyd (ed.) Advances in Cryptology - ASIA CRYPT 2001, Vol.2248, Lecture Notes in Computer Science, pp. 52-66, Springer-Verlag, 2001.
-
(2001)
Advances in Cryptology - ASIA CRYPT 2001
, vol.2248
, pp. 52-66
-
-
Hopper, N.1
Blum, M.2
-
10
-
-
33746104831
-
Parallel and concurrent security of the hb and hb++ protocols
-
Lecture Notes in Computer Science, Springer
-
J. Katz, and J. Shin, "Parallel and Concurrent Security of the HB and HB++ Protocols", Advances in Cryptology - EURO CRYPT 2006, Vol.4004, Lecture Notes in Computer Science, pp. 73-87, Springer, 2006.
-
(2006)
Advances in Cryptology - EURO CRYPT 2006
, vol.4004
, pp. 73-87
-
-
Katz, J.1
Shin, J.2
-
11
-
-
14844290165
-
Enhancing RFID privacy via antenna energy analysis
-
November, Boston, USA
-
K. Fishkin, and S. Roy, "Enhancing RFID Privacy via Antenna Energy Analysis", MIT RFID Privacy Workshop, November 15, 2003, Boston, USA.
-
(2003)
MIT RFID Privacy Workshop
, vol.15
-
-
Fishkin, K.1
Roy, S.2
-
12
-
-
58049137086
-
High-power proxies for enhancing RFID privacy and utility
-
May 30-June, Dubrovnik, Croatia
-
A. Juels, P. Syverson, and D. Bailey, "High-Power Proxies for Enhancing RFID Privacy and Utility", Workshop on Privacy Enhancing Technologies (PET), May 30-June 1, 2005, Dubrovnik, Croatia.
-
(2005)
Workshop on Privacy Enhancing Technologies (PET)
, vol.1
-
-
Juels, A.1
Syverson, P.2
Bailey, D.3
-
13
-
-
34547687590
-
Defining strong privacy for RFID
-
March 30, White Plains, NY, USA
-
A. Juels, and S. Weis, "Defining Strong Privacy for RFID", Fifth IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 342-347, March 30, 2007, White Plains, NY, USA.
-
(2007)
Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
, pp. 342-347
-
-
Juels, A.1
Weis, S.2
-
14
-
-
20844453821
-
Minimalist cryptography for low-cost RFID tags
-
September 8-10, Amalfi, Italy
-
A. Juels, "Minimalist Cryptography for Low-cost RFID Tags," The Fourth International Conference on Security in Communication Networks, pp. 149-164, September 8-10, 2004, Amalfi, Italy.
-
(2004)
The Fourth International Conference on Security in Communication Networks
, pp. 149-164
-
-
Juels, A.1
|