Active Bibliography

The Resurrecting Duckling: – Security Issues For, Frank Stajano, Ross Anderson - 1999
Chapter 39 – Privacy And Security, Security Consultant
Adaptive Multimedia in Wireless IP Networks – Matheos Ioannis Kazantzidis, Matheos Ioannis Kazantzidis, Mani Srivastava, Ioannis Kazantzidis - 2002
4 Causality in Autonomous Mobile Systems – Carlos Baquero, Francisco Moura - 1999
1 ON FAIRNESS AND EFFICIENCY OF ADAPTIVE AUDIO APPLICATION LAYERS FOR MULTIHOP WIRELESS NETWORKS MANTHOS I. KAZANTZIDIS, LAN WANG, DR MARIO GERLA UCLA CS WAM Lab – Kazantz Lanw Gerla, Manthos I. Kazantzidis, Lan Wang, Dr Mario Gerla - 1999
23 ON FAIRNESS AND EFFICIENCY OF ADAPTIVE AUDIO APPLICATION LAYERS FOR MULTIHOP WIRELESS NETWORKS – Manthos I. Kazantzidis, Lan Wang, Mario Gerla - 1999
1 Security in embedded systems: Design challenges – Paul Kocher - 2004
20 Trusting Trusted Hardware: Towards a Formal Model for Programmable Secure Coprocessors – Sean W. Smith, Vernon Austel - 1998
9 Cryptanalysis of a Provably Secure CRT-RSA Algorithm – David Wagner - 2004
To appear in Journal of Cryptology. Chinese Remaindering Based Cryptosystems in the Presence of Faults – Marc Joye, Arjen K. Lenstra, Jean-jacques Quisquater
27 Chinese Remaindering Based Cryptosystems in the Presence of Faults – Marc Joye, Arjen K. Lenstra, Jean-jacques Quisquater
4 A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards (Extended Abstract) – Noam Kogan, Yuval Shavitt, Avishai Woo - 2003
7 Security issues in m-commerce: A usage-based taxonomy. E-Commerce Agents – Suresh Chari, Parviz Kermani, Sean Smith, Ros Tassiulas - 2001
196 Building a high-performance, programmable secure coprocessor – Sean W. Smith, Elaine R. Palmer, Steve Weingart - 1999
8 Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing – Yongbin Zhou, DengGuo Feng - 2005
64 The Resurrecting Duckling - what next? – Frank Stajano, B. Christianson, B. Crispo, M. Roe (eds - 2000
10 Jam resistant communications without shared secrets – Leemon C. Baird Iii, William L. Bahn, Michael, D. Collins - 2008
16 JAM-RESISTANT COMMUNICATION WITHOUT SHARED SECRETS THROUGH THE USE OF CONCURRENT CODES – Leemon C. Baird, III, William L. Bahn, Michael D. Collins - 2007
15 Keyless jam resistance – Leemon C. Baird Iii, William L. Bahn, Michael D. Collins, Martin C. Carlisle, Sean C. Butler - 2007