-
1
-
-
24644465803
-
-
http://www.secureyourmotor.gov.uk.
-
-
-
-
2
-
-
24644487534
-
-
http://www.verkehrsunfallforensik.de/pdf/68_Wegfahrsperren.pdf.
-
-
-
-
4
-
-
24644510936
-
Die neue Strategie der Autodiebe
-
Die neue Strategie der Autodiebe. Frankfurter Allgemeine Zeitung, Nr. 40, Seite T1, 2004.
-
(2004)
Frankfurter Allgemeine Zeitung
, vol.40
-
-
-
5
-
-
85030309636
-
Identification tokens - Or: Solving the chess grandmaster problem
-
A.J. Menezes and S.A. Vanstone, editors, Advances in Cryptology - CRYPTO '90, International Association for Cryptologic Research, Springer-Verlag, Berlin Germany
-
Thomas Beth and Yvo Desmedt. Identification Tokens - Or: Solving the Chess Grandmaster Problem. In A.J. Menezes and S.A. Vanstone, editors, Advances in Cryptology - CRYPTO '90, volume 537 of Lecture Notes in Computer Science, pages 169-176. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.537
, pp. 169-176
-
-
Beth, T.1
Desmedt, Y.2
-
6
-
-
84958641478
-
Differential fault analysis of secret key cryptosystems
-
Burton S. Kaliski Jr., editor, Advances in Cryptology - CRYPTO '97, Springer-Verlag
-
Eli Biham and Adi Shamir. Differential Fault Analysis of Secret Key Cryptosystems. In Burton S. Kaliski Jr., editor, Advances in Cryptology - CRYPTO '97, volume 1294 of LNCS, pages 513-525. Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
8
-
-
84976295016
-
Distance-bounding protocols
-
T. Helleseth, editor, Advances in Cryptology - EUROCRYPT '93, International Association for Cryptologic Research, Springer-Verlag, Berlin Germany
-
Stefan Brands and David Chaum. Distance-Bounding Protocols. In T. Helleseth, editor, Advances in Cryptology - EUROCRYPT '93, volume 765 of Lecture Notes in Computer Science, pages 344-359. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
9
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
M. Joye and J.-J. Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag
-
Martin Feldhofer, Sandra Dominikus, and Johannes Wolkerstorfer. Strong Authentication for RFID Systems Using the AES Algorithm. In M. Joye and J.-J. Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004, volume 3156 of LNCS, pages 357-370. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
11
-
-
24644448926
-
-
Nov Version 1.2.
-
Trusted Computing Group. TPM main specification. http://www. trustedcomputinggroup.org, Nov 2003. Version 1.2.
-
(2003)
TPM Main Specification
-
-
-
12
-
-
24644496958
-
Theft protection by means of embedded encryption in RFID transponders
-
Cologne, Germany, November
-
Ulrich Kaiser. Theft Protection by means of Embedded Encryption in RFID Transponders (Immobilizer). ESCAR conference, Cologne, Germany, November 2003.
-
(2003)
ESCAR Conference
-
-
Kaiser, U.1
-
13
-
-
0033705991
-
Side channel cryptanalysis of product ciphers
-
John Kelsey, Bruce Schneier, David Wagner, and Chris Hall. Side Channel Cryptanalysis of Product Ciphers. Journal of Computer Security, 8(2/3):141-158, 2000.
-
(2000)
Journal of Computer Security
, vol.8
, Issue.2-3
, pp. 141-158
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
14
-
-
84939573910
-
Differential power analysis
-
M. Wiener, editor, Advances in Cryptology - CRYPTO '99, Springer-Verlag
-
Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. Differential Power Analysis. In M. Wiener, editor, Advances in Cryptology - CRYPTO '99, volume 1666 of LNCS, pages 388-397. Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
15
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Security Protocols-7th International Workshop, Cambridge, United Kingdom, Springer-Verlag, Berlin Germany
-
Frank Stajano and Ross Anderson. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In Security Protocols-7th International Workshop, volume 1796 of Lecture Notes in Computer Science, pages 172-194, Cambridge, United Kingdom, 2000. Springer-Verlag, Berlin Germany.
-
(2000)
Lecture Notes in Computer Science
, vol.1796
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
16
-
-
5444232966
-
Electronical driving authority - How safe is safe?
-
W. Thönnes and S. Kruse. Electronical driving authority - how safe is safe? -. VDI Berichte Nr. 1789, 2003.
-
(2003)
VDI Berichte Nr. 1789
, vol.1789
-
-
Thönnes, W.1
Kruse, S.2
|