Now showing items 181-184 of 184
Towards a Needs-ICTD Strategy Alignment Framework
(International Development Informatics Association, 2013)
Access to ICTD projects has increased over the years; however, it has not significantly changed the lives of the communities they are involved in. The cause of this discrepancy is the gap that exists between the reality ...
Deploying OSK on Low-Resource Mobile Devices
It is a popular challenge to design authentication protocols that are both privacy-friendly and scalable. A large body of literature in RFID is dedicated to that goal, and many inventive mechanisms have been suggested to ...
Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography
The recent advent of ubiquitous technologies has raised an important concern for citizens: the need to protect their privacy. So far, this wish was not heard of industrials, but national and international regulation ...
Solution of a Conjecture: On 2-PCD RFID Distance Bounding Protocols
It is a popular challenge to design distance bounding protocols that are both secure and efficient. Motivated by this, many distance bounding protocols against relay attacks have been advanced in recent times. Another ...