Author:
Dolev Shlomi,Gilboa Niv,Kopeetsky Marina,Persiano Giuseppe,Spirakis Paul G.
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference11 articles.
1. Everlasting security in the bounded storage model;Aumann;IEEE Transactions on Information Theory,2002
2. M. Barbeau, J. Hall, E. Kranakis, Intrusion Detection and Radio Frequency Fingerprinting in Mobile and Wireless Networks, Technical Report, Carleton University, School of Computer Science, 2003.
3. C. Cachin, U. Maurer, Unconditional Security Against Memory-Bounded Adversaries, CRYPTO’97, 1997, pp. 292–306.
4. Y.Z. Ding, M.O. Rabin, Hyperencryption and Everlasting Security, Annual Symposium on Theoretical Aspects of Computer Science (STACS), 2002, pp. 1–26.
5. RFID authentication efficient proactive information security within computational security;Dolev;Theory of Computing Systems Journal,2011
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献