Author:
Peris-Lopez Pedro,Orfila Agustin,Palomar Esther,Hernandez-Castro Julio C.
Publisher
Springer Science and Business Media LLC
Subject
Management Science and Operations Research,Computer Science Applications,Hardware and Architecture
Reference77 articles.
1. O’Connor MC (2009) Bridge researchers demo highly secure EPC Gen-2 RFID. RFID J. http://www.rfidjournal.com/article/view/5074
2. Abadi M, Burrows M, Manasse M, Wobber T (2003) Moderately hard, memory-bound functions. In: Proceedings of the 10th annual network and distributed system security symposium, pp 25–39
3. Avoine G, Tchamkerten A (2009) An efficient distance bounding RFID authentication protocol : balancing false acceptance rate and memory requirement. In: Proceedings of the information security conference (ISC’09), pp 250–261
4. Avoine G, Kalach K, Quisquater JJ (2008) ePassport: securing international contacts with contactless chips. In: Financial cryptography and data security – FC’08, vol 5143, Springer, Berlin, Lecture Notes in Computer Science, pp 141–155
5. Back A (2002) Hashcash. A denial of service counter-measure. Technical report. http://www.hashcash.org/hashcash.pdf
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献