[RDF data]
Home | Example Publications
PropertyValue
dcterms:bibliographicCitation <http://dblp.uni-trier.de/rec/bibtex/conf/wcnis/GodorGI10>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Gy%E2%88%9A%E2%88%82z%E2%88%9A%E2%88%82_G%E2%88%9A%E2%89%A5dor>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Norbert_Giczi>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/S%E2%88%9A%C2%B0ndor_Imre>
foaf:homepage <http://dx.doi.org/doi.org%2F10.1109%2FWCINS.2010.5541860>
foaf:homepage <https://doi.org/10.1109/WCINS.2010.5541860>
dc:identifier DBLP conf/wcnis/GodorGI10 (xsd:string)
dc:identifier DOI doi.org%2F10.1109%2FWCINS.2010.5541860 (xsd:string)
dcterms:issued 2010 (xsd:gYear)
rdfs:label Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems - performance analysis by simulations. (xsd:string)
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Gy%E2%88%9A%E2%88%82z%E2%88%9A%E2%88%82_G%E2%88%9A%E2%89%A5dor>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Norbert_Giczi>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/S%E2%88%9A%C2%B0ndor_Imre>
swrc:pages 650-657 (xsd:string)
dcterms:partOf <https://dblp.l3s.de/d2r/resource/publications/conf/wcnis/2010>
owl:sameAs <http://bibsonomy.org/uri/bibtexkey/conf/wcnis/GodorGI10/dblp>
owl:sameAs <http://dblp.rkbexplorer.com/id/conf/wcnis/GodorGI10>
rdfs:seeAlso <http://dblp.uni-trier.de/db/conf/wcnis/wcnis2010.html#GodorGI10>
rdfs:seeAlso <https://doi.org/10.1109/WCINS.2010.5541860>
swrc:series <https://dblp.l3s.de/d2r/resource/conferences/wcnis>
dc:title Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems - performance analysis by simulations. (xsd:string)
dc:type <http://purl.org/dc/dcmitype/Text>
rdf:type swrc:InProceedings
rdf:type foaf:Document