|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 6 occurrences of 4 keywords
|
|
|
Results
Found 3 publication records. Showing 3 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Youqin Chen, Zhide Chen, Li Xu 0002 |
RFID System Security Using Identity-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IITSI ![In: Third International Symposium on Intelligent Information Technology and Security Informatics, IITSI 2010, Jinggangshan, China, April 2-4, 2010, pp. 460-464, 2010, IEEE Computer Society, 978-0-7695-4020-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Secure Two-way Authentication Protocol, Learning Parity in the Presence of Noise, HB, HB+, HB++, RFID |
1 | Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagórski |
Attacks on CKK Family of RFID Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADHOC-NOW ![In: Ad-hoc, Mobile and Wireless Networks, 7th International Conference, ADHOC-NOW 2008, Sophia-Antipolis, France, September 10-12, 2008, Proceedings, pp. 241-250, 2008, Springer, 978-3-540-85208-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
HB, HB+, authentication, RFID, lightweight cryptography |
1 | Khaled Ouafi, Raphael Overbeck, Serge Vaudenay |
On the Security of HB# against a Man-in-the-Middle Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings, pp. 108-124, 2008, Springer, 978-3-540-89254-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
HB, RFID, authentication protocols |
Displaying result #1 - #3 of 3 (100 per page; Change: )
|
|