Author:
Batina Lejla,Seys Stefaan,Singelée Dave,Verbauwhede Ingrid
Publisher
Springer Berlin Heidelberg
Reference26 articles.
1. Avoine, G.: Adversarial Model for Radio Frequency Identification. In: Cryptology ePrint Archive, Report 2005/049 (2005),
http://eprint.iacr.org/
2. Lecture Notes in Computer Science;M. Bellare,2002
3. Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004), pp. 132–145. ACM (2004)
4. Bringer, J., Chabanne, H.: Trusted-HB: A Low-Cost Version of HB
+ Secure Against Man-in-the-Middle Attacks. IEEE Transactions on Information Theory 54(9), 4339–4342 (2008)
5. Bringer, J., Chabanne, H., Dottax, E.: HB
+ + : a Lightweight Authentication Protocol Secure against Some Attacks. In: Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), pp. 28–33. IEEE Computer Society (2006)
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献