Author:
Petrocchi Marinella,Spognardi Angelo,Santi Paolo
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Information Systems,Software
Reference31 articles.
1. Avoine G, Oechslin P (2005) A scalable and provably secure hash based RFID protocol. In: International workshop on pervasive computing and communication security (PerSec ’05), pp. 110–114
2. BIONETS website. http://www.bionets.eu/
3. Clarke E, Jha S, Marrero W (2000) Verifying security protocols with Brutus. ACM Trans Softw Eng Methodol 9(4):443–487
4. Clavel M, Durán F, Eker S, Lincoln P, Martí-Oliet N, Meseguer J, Talcott CL (eds) (2007) All About Maude - A high-performance logical framework, how to specify, program and verify systems in rewriting logic, LNCS, vol. 4350 Springer
5. Conti M, Di Pietro R, Mancini LV, Spognardi A (2007) RIPP-FS: An RFID identification, privacy preserving protocol with forward secrecy. In: IEEE international conference on pervasive computing and communications workshops, 2007. Fifth Annual , pp. 229–234. IEEE
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献