„RFID Authentication“
Suchergebnisse
1.000+ Treffer
-
C2MP: Chebyshev chaotic map-based authentication protocol for RFID applications
-
A vector-space-based lightweight RFID authentication protocol
-
Mutual authentication protocol for low cost passive tag in RFID system
-
Towards a Lightweight, Secure, and Untraceable RFID Authentication Protocol
-
Fast Software Encryption – 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers
-
Radio Frequency Identification – Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers
-
Radio Frequency Identification. Security and Privacy Issues – 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers
-
RFID. Security and Privacy – 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers
-
Security Protocols XIX – 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers
-
Fast Software Encryption – 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers
-
Data Privacy Management and Autonomous Spontaneous Security – 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Athens, Greece, September 23, 2010, Revised Selected Papers
-
Exploring the Grand Challenges for Next Generation E-Business – 8th Workshop on E-Business, WEB 2009, Phoenix, AZ, USA, December 15, 2009, Revised Selected Papers
-
Integrated Identification System at the University of West Bohemia - Architecture, Use and Experiences
-
Retraction Note: Improved RFID mutual authentication protocol against exhaustive attack in the context of big data
-
Erratum to: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment
-
A lightweight security authentication protocol for RFID
-
Internet of things encryption technology combining elliptic curve cryptosystem, hash function, and RFID-based authentication
-
Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags
-
Algebraic Attacks against Linear RFID Authentication Protocols
-
Fast software encryption – 20th international workshop ; revised selected papers