Publisher
Springer Berlin Heidelberg
Reference10 articles.
1. Lecture Notes in Computer Science;S. Brands,1994
2. Denning, D.E., MacDoran, P.F.: Location-Based Authentication: Grounding Cyberspace for Better Security. In: Computer Fraud & Security, pp. 12-16 (February 1996)
3. Desmedt, Y.: Major Security Problems with the ‘Unforgeable’ (Feige)-Fiat-Shamir Proofs of Identity and How to Overcome Them. In: Proceedings of the Securicom 88, 6th Worldwide Congress on Computer and Communications Security and Protection, pp. 147–159 (1988)
4. Hancke, G.P., Kuhn, M.G.: An RFID Distance Bounding Protocol. In: Proceedings of the IEEE/Create-Net SecureComm, pp. 67–73 (2005)
5. Hering, J.: The BlueSniper ‘rifle.’ presented at 12th DEFCON. Las Vegas (2004)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献