-
1
-
-
78650178996
-
-
22C3
-
22C3 (2007). RFID Zapper. https://events.ccc.de/congress/2005/static/r/f/ i/RFID-Zapper(EN)-77f3.html. Accessed July 2009.
-
(2007)
RFID Zapper
-
-
-
2
-
-
26444478592
-
RFID traceability: A multilayer problem
-
A.S. Patrick M. Yung (eds). Springer-Verlag Berlin, Heidelberg 10.1007/b137875 Avoine
-
G Avoine P Oechslin 2005 RFID traceability: A multilayer problem AS Patrick M Yung (eds) Financial cryptography and data security, 9th international C, FS 2005, Roseau, The Commonwealth of Dominica Lecture notes in computer science, security and cryptology 3570 Springer-Verlag Berlin, Heidelberg 125 140 10.1007/b137875 Avoine, G.; Oechslin, P. (2005). RFID traceability: A multilayer problem. In A. S. Patrick; M. Yung (Eds.), Financial cryptography and data security, 9th international C, FS 2005, Roseau, The Commonwealth of Dominica. Lecture notes in computer science, security and cryptology (Vol. 3570, pp. 125-140). Berlin, Heidelberg: Springer-Verlag. doi: 10.1007/b137875.
-
(2005)
Financial Cryptography and Data Security, 9th International C, FS 2005, Roseau, the Commonwealth of Dominica Lecture Notes in Computer Science, Security and Cryptology
, Issue.3570
, pp. 125-140
-
-
Avoine, G.1
Oechslin, P.2
-
3
-
-
84979828637
-
Roadmap to solving security and privacy concerns in RFID systems
-
DOI 10.1016/j.clsr.2007.09.005, PII S026736490700091X
-
J Ayoade 2007 Privacy and RFID systems, roadmap for solving security and privacy concerns in RFID systems Computer Law; Security Report 23 555 561 10.1016/j.clsr.2007.09.005 (Pubitemid 350026134)
-
(2007)
Computer Law and Security Report
, vol.23
, Issue.6
, pp. 555-561
-
-
Ayoade, J.1
-
6
-
-
49049105769
-
Design and implementation of PUF-based "unclonable" RFID ICs for anti-counterfeiting and security applications
-
IEEE Computer Society Las Vegas. 10.1109/RFID.2008.4519377
-
Devadas, S.; Suh, E.; Paral, S.; Sowell, R.; Ziola, T.; Khandelwal, V. (2008). Design and implementation of PUF-based "unclonable" RFID ICs for anti-counterfeiting and security applications. In Proceedings of the 2008 IEEE international conference on RFID, 16-17 April 2008 (pp. 58-64). Las Vegas: IEEE Computer Society.
-
(2008)
Proceedings of the 2008 IEEE International Conference on RFID, 16-17 April 2008
, pp. 58-64
-
-
Devadas, S.1
Suh, E.2
Paral, S.3
Sowell, R.4
Ziola, T.5
Khandelwal, V.6
-
8
-
-
84873856034
-
-
Emvelope
-
Emvelope (2005). Products. http://www.emvelope.com/products. Accessed July 2009.
-
(2005)
Products
-
-
-
9
-
-
45949111937
-
-
EPCGlobal
-
EPCGlobal (2005). Guidelines on EPC for consumer products. http://www.epcglobalinc.org/public/ppsc-guide/. Accessed July 2009.
-
(2005)
Guidelines on EPC for Consumer Products
-
-
-
10
-
-
78650172740
-
EPC radio-frequency identity protocols Class-1 Generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz
-
EPCGlobal Inc. (Vol. 1.2.0)
-
EPCGlobal Inc. (2005). EPC radio-frequency identity protocols Class-1 Generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz. Specification for RFID air interface. (Vol. 1.2.0). http://www.epcglobalinc.org/ standards/uhfc1g2/uhfc1g2-1-2-0-standard-20080511.pdf. Accessed July 2009.
-
(2005)
Specification for RFID Air Interface
-
-
-
11
-
-
0003187764
-
Directive 95/46/EC of the European parliament and of the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free Movement of such data
-
European Commission (L.281)
-
European Commission (1995). Directive 95/46/EC of the European parliament and of the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free Movement of such data. Official Journal of European Communities, (L.281), 31.
-
(1995)
Official Journal of European Communities
, pp. 31
-
-
-
12
-
-
78650174684
-
Cloning an electronic passport
-
European Digital Rights (EDRI-gram)
-
European Digital Rights (EDRI-gram) (2006). Cloning an electronic passport. EDRI-gram, digital civil rights in Europe. No. 4-16. http://www.edri.org/edrigram/number4.16/epassport/. Accessed July 2009.
-
(2006)
EDRI-gram, Digital Civil Rights in Europe
, Issue.4-16
-
-
-
13
-
-
37149018203
-
-
Federal Office for Information Security RFID consultation website
-
Federal Office for Information Security (2004). Security aspects and prospective applications of RFID systems. RFID consultation website. http://www.rfidconsultation.eu/docs/ficheiros/RIKCHA-englisch-Layout.pdf. Accessed July 2009.
-
(2004)
Security Aspects and Prospective Applications of RFID Systems
-
-
-
15
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
M. Joye; J.-J. Quisquater (Eds.) Berlin: Springer. doi: 10.1007/b99451
-
Fedhofer, M.; Dominikus, S.; Wolkerstorfer, J. (2004). Strong authentication for RFID systems using the AES algorithm. In M. Joye; J.-J. Quisquater (Eds.), Cryptographic hardware and embedded systems - CHES 2004. Proceedings of the 6th international workshop on cryptographic hardware and embedded systems (CHES'04). Lecture notes in computer science (Vol. 3156, pp. 357-370). Berlin: Springer. doi: 10.1007/b99451.
-
(2004)
Cryptographic Hardware and Embedded Systems - CHES 2004. Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems (CHES'04). Lecture Notes in Computer Science
, vol.3156
, pp. 357-370
-
-
Fedhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
16
-
-
23944477452
-
Some methods for privacy in RFID communication
-
C. Castellucia H. Hartenstein C. Paar D. Westhoff (eds). Springer Berlin 10.1007/b105219 Fishkin
-
K Fishkin S Roy B Jiang 2004 Some methods for privacy in RFID communication C Castellucia H Hartenstein C Paar D Westhoff (eds) Security in Ad-hoc and sensor networks, proceedings of the 1st European workshop on security (ESAS '04) Lecture notes in computer science, computer communication networks and telecommunications 3313 Springer Berlin 42 53 10.1007/b105219 Fishkin, K.; Roy, S.; Jiang, B. (2004). Some methods for privacy in RFID communication. In C. Castellucia, H. Hartenstein, C. Paar,; D. Westhoff (Eds.), Security in Ad-hoc and sensor networks, proceedings of the 1st European workshop on security (ESAS '04). Lecture notes in computer science, computer communication networks and telecommunications (Vol. 3313, pp. 42-53). Berlin: Springer. doi: 10.1007/b105219.
-
(2004)
Security in Ad-hoc and Sensor Networks, Proceedings of the 1st European Workshop on Security (ESAS '04) Lecture Notes in Computer Science, Computer Communication Networks and Telecommunications
, Issue.3313
, pp. 42-53
-
-
Fishkin, K.1
Roy, S.2
Jiang, B.3
-
17
-
-
26444442422
-
Scanning with a purpose-supporting the fair information principles in RFID protocols
-
H. Murakami H. Nakashima H. Tokuda M. Yasumura (eds). Springer Berlin 10.1007/11526858 Floerkemeier
-
C Floerkemeier R Schneider M Langheinrich 2004 Scanning with a purpose-supporting the fair information principles in RFID protocols H Murakami H Nakashima H Tokuda M Yasumura (eds) Ubiquitous computing systems, second international symposium (UCS '04), Tokyo, Japan Lecture notes in computer science 3598 Springer Berlin 214 231 10.1007/11526858 Floerkemeier, C.; Schneider, R.; Langheinrich, M. (2004). Scanning with a purpose-supporting the fair information principles in RFID protocols. In H. Murakami, H. Nakashima, H. Tokuda,; M. Yasumura (Eds.), Ubiquitous computing systems, second international symposium (UCS '04), Tokyo, Japan. Lecture notes in computer science (Vol.3598, pp. 214-231). Berlin: Springer. doi: 10.1007/11526858.
-
(2004)
Ubiquitous Computing Systems, Second International Symposium (UCS '04), Tokyo, Japan Lecture Notes in Computer Science
, Issue.3598
, pp. 214-231
-
-
Floerkemeier, C.1
Schneider, R.2
Langheinrich, M.3
-
19
-
-
57049128814
-
Dismantling MIFARE classic
-
Springer Berlin
-
Garcia, F. D.; de Koning Gans, G.; Muijrers, R.; van Rossum P.; Verdult, R.; Wichers Schreur, R.; et al. (2008). Dismantling MIFARE classic. In Proceedings of the 13th European symposium on research in computer security, Malaga, Spain. Lecture notes in computer science (Vol. 5283, pp. 97-114). Berlin: Springer.
-
(2008)
Proceedings of the 13th European Symposium on Research in Computer Security, Malaga, Spain Lecture Notes in Computer Science
, Issue.5283
, pp. 97-114
-
-
Garcia, F.D.1
De Koning Gans, G.2
Muijrers, R.3
Van Rossum, P.4
Verdult, R.5
Wichers Schreur, R.6
-
20
-
-
20844459862
-
RFID privacy: An overview of problems and proposed solutions
-
DOI 10.1109/MSP.2005.78
-
S Garfinkel A Juels R Pappu 2005 RFID privacy: An overview of problems and proposed solutions IEEE Security; Privacy 3 3 34 43 10.1109/MSP.2005.78 (Pubitemid 40860471)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 34-43
-
-
Garfinkel, S.L.1
Juels, A.2
Pappu, R.3
-
23
-
-
77950473836
-
Security requirements for cryptographic modules
-
Information Technology Laboratory, National Institute of Standards and Technology FIPS PUB 140-2. 25 May 2001
-
Information Technology Laboratory, National Institute of Standards and Technology (2001). Security requirements for cryptographic modules. Federal information processing standards publication. FIPS PUB 140-2. 25 May 2001. http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf. Accessed July 2009.
-
(2001)
Federal Information Processing Standards Publication
-
-
-
25
-
-
78650180345
-
-
International Civil Aviation Organization
-
International Civil Aviation Organization (2002). ICAO document 9303 - Part 1 machine readable passport (Vol. 2). http://www2.icao.int/en/MRTD/Pages/ Doc9393.aspx. Accessed July 2009.
-
(2002)
ICAO Document 9303 - Part 1 Machine Readable Passport
, vol.2
-
-
-
26
-
-
78650173168
-
-
International Organization for Standardization Part 2 (2008), Part 3 (1998), Part 4 (1999), Part 5 (2004) Accessed July 2009
-
International Organization for Standardization (2009). ISO/IEC 9798: Information technology-security techniques-entity authentication, Part 1(1997), Part 2 (2008), Part 3 (1998), Part 4 (1999), Part 5 (2004). www.iso.org. Accessed July 2009.
-
(1997)
ISO/IEC 9798: Information Technology-security Techniques-entity Authentication
, Issue.PART 1
-
-
-
27
-
-
23944476196
-
Minimalist cryptography for low-cost RFID tags
-
C. Blundo S. Cimato (eds). Springer Berlin 10.1007/b105083 Juels
-
A Juels 2004 Minimalist cryptography for low-cost RFID tags C Blundo S Cimato (eds) Security in communication networks, proceedings of the 4th international conference on security in communication networks (SCN'04), Amalfi, Italy, 8-10 September 2004 Lecture notes in computer science, security and cryptology 3352 Springer Berlin 149 164 10.1007/b105083 Juels, A. (2004). Minimalist cryptography for low-cost RFID tags. In C. Blundo; S. Cimato (Eds.), Security in communication networks, proceedings of the 4th international conference on security in communication networks (SCN'04), Amalfi, Italy, 8-10 September 2004. Lecture notes in computer science, security and cryptology (Vol. 3352, pp. 149-164). Berlin: Springer. doi: 10.1007/b105083.
-
(2004)
Security in Communication Networks, Proceedings of the 4th International Conference on Security in Communication Networks (SCN'04), Amalfi, Italy, 8-10 September 2004 Lecture Notes in Computer Science, Security and Cryptology
, Issue.3352
, pp. 149-164
-
-
Juels, A.1
-
28
-
-
33749028998
-
Stengthening EPC tags against cloning
-
M. Jakobsson R. Povendran (eds). ACM New York. 10.1145/1080793.1080805
-
Juels, A. (2005). Stengthening EPC tags against cloning. In M. Jakobsson; R. Povendran (Eds.), Proceedings of ACM workshop on wireless security (WiSec'05) (pp. 67-76). New York: ACM.
-
(2005)
Proceedings of ACM Workshop on Wireless Security (WiSec'05)
, pp. 67-76
-
-
Juels, A.1
-
29
-
-
18744409344
-
The Blocker tag: Selective blocking of RFID tags for consumer privacy
-
V. Alturi (eds). ACM New York
-
Juels, A.; Rivest, R.; Szydlo, M. (2003). The Blocker tag: Selective blocking of RFID tags for consumer privacy. In V. Alturi (Ed.), Proceedings of the 8th ACM conference on computer and communication security, Washington, DC, USA (pp. 103-111). New York: ACM.
-
(2003)
Proceedings of the 8th ACM Conference on Computer and Communication Security, Washington, DC, USA
, pp. 103-111
-
-
Juels, A.1
Rivest, R.2
Szydlo, M.3
-
30
-
-
33749011985
-
Disabling RFID tags with visible confirmation: Clipped tags are silenced
-
V. Atluri S.D.C. di Vimercanti R. Dingledine (eds). ACM Alexandria. 10.1145/1102199.1102205
-
Karjoth, G.; Moskowitz, P. A. (2005). Disabling RFID tags with visible confirmation: Clipped tags are silenced. In V. Atluri, S.D.C. di Vimercanti,; R. Dingledine (Eds.), Proceedings of the 2005 ACM workshop on privacy in the electronic society (WPES '05) (pp. 27-30). Alexandria: ACM.
-
(2005)
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (WPES '05)
, pp. 27-30
-
-
Karjoth, G.1
Moskowitz, P.A.2
-
32
-
-
50149108262
-
-
NIST Special publication 800-98, national institute of standards and technology, technology administration U.S. Department of Commerce
-
Karygiannis, T.; Eydt, B.; Barber, G.; Bunn, L.; Phillips, T. (2007). Guidelines for securing radio frequency identification (RFID) systems: Recommendations of the national institute of standards and technology. NIST Special publication 800-98, national institute of standards and technology, technology administration U.S. Department of Commerce.
-
(2007)
Guidelines for Securing Radio Frequency Identification (RFID) Systems: Recommendations of the National Institute of Standards and Technology
-
-
Karygiannis, T.1
Eydt, B.2
Barber, G.3
Bunn, L.4
Phillips, T.5
-
33
-
-
33750466434
-
Malaysia car thieves steal finger
-
31 March 2005
-
Kent, J. (2005). Malaysia car thieves steal finger. BBC News, 31 March 2005. http://news.bbc.co.uk/2/hi/asia-pacific/4396831.stm. Accessed July 2009.
-
(2005)
BBC News
-
-
Kent, J.1
-
36
-
-
34548830678
-
Practical attacks against RFID
-
DOI 10.1016/S1353-4858(07)70080-6, PII S1353485807700806
-
A Laurie 2007 Practical attacks against RFID Network Security 9 4 7 10.1016/S1353-4858(07)70080-6 (Pubitemid 47449639)
-
(2007)
Network Security
, vol.2007
, Issue.9
, pp. 4-7
-
-
Laurie, A.1
-
42
-
-
33749420060
-
Performance analysis of tag anti-collision algorithms for RFID systems
-
Springer Berlin 10.1007/11807964 Quan
-
CH Quan WK Hong HC Kim 2006 Performance analysis of tag anti-collision algorithms for RFID systems Emerging directions in embedded and ubiquitous computing, proceedings of EUC 2006 workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006 Lecture notes in computer science, information systems and applications, incl. Internet/Web, and HCI Springer Berlin 382 391 10.1007/11807964 Quan, C. H.; Hong, W. K.; Kim, H. C. (2006). Performance analysis of tag anti-collision algorithms for RFID systems. In Emerging directions in embedded and ubiquitous computing, proceedings of EUC 2006 workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006. Lecture notes in computer science, information systems and applications, incl. Internet/Web, and HCI (Vol. 4097, pp. 382-391). Berlin: Springer. doi: 10.1007/11807964.
-
(2006)
Emerging Directions in Embedded and Ubiquitous Computing, Proceedings of EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006 Lecture Notes in Computer Science, Information Systems and Applications, Incl. Internet/Web, and HCI
, pp. 382-391
-
-
Quan, C.H.1
Hong, W.K.2
Kim, H.C.3
-
43
-
-
78650178803
-
-
Raboud University Nijmegen 08-33A. Press Release Accessed July 2009
-
Raboud University Nijmegen (2008). Dismantling contactless smart cards. 08-33A. Press Release. http://www2.ru.nl/media/pressrelease.pdf. Accessed July 2009.
-
(2008)
Dismantling Contactless Smart Cards
-
-
-
44
-
-
34748825630
-
Detecting relay attacks with timing-based protocols
-
DOI 10.1145/1229285.1229314, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
-
Reid, J.; Gonzalez Nieto, J. M.; Tang, T.; Senadji, B. (2007). Detecting relay attacks with timing-based protocols. In Proceedings of the 2nd ASIAN symposium on information, computer and communications security, Singapore (pp. 204-213). New York: ACM. (Pubitemid 47479240)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
, pp. 204-213
-
-
Reid, J.1
Nieto, J.M.G.2
Tang, T.3
Senadji, B.4
-
45
-
-
26444435642
-
RFID Guardian: A battery-powered mobile device for RFID privacy management
-
C. Boyd N. González M. Juan (eds). Springer Berlin 10.1007/11506157 Rieback
-
M Rieback B Crispo A Tanenbaum 2005 RFID Guardian: A battery-powered mobile device for RFID privacy management C Boyd N González M Juan (eds) Information security and privacy, proceedings of the 10th Australasian conference on information security and privacy (ACISP '05), Brisbane, Australia, July 4-6, 2005 Lecture notes in computer science, security and cryptology 3574 Springer Berlin 184 194 10.1007/11506157 Rieback, M.; Crispo, B.; Tanenbaum, A. (2005). RFID Guardian: A battery-powered mobile device for RFID privacy management. In C. Boyd, N. González,; M. Juan (Eds.), Information security and privacy, proceedings of the 10th Australasian conference on information security and privacy (ACISP '05), Brisbane, Australia, July 4-6, 2005. Lecture notes in computer science, security and cryptology (Vol. 3574, pp. 184-194). Berlin: Springer. doi: 10.1007/11506157.
-
(2005)
Information Security and Privacy, Proceedings of the 10th Australasian Conference on Information Security and Privacy (ACISP '05), Brisbane, Australia, July 4-6, 2005 Lecture Notes in Computer Science, Security and Cryptology
, Issue.3574
, pp. 184-194
-
-
Rieback, M.1
Crispo, B.2
Tanenbaum, A.3
-
46
-
-
33747304628
-
Is your cat infected with a computer virus?
-
IEEE Computer Society Washington, DC
-
Rieback, M.; Crispo, B.; Tanenbaum, A. (2006). Is your cat infected with a computer virus? In Proceedings of the 4th IEEE international conference on pervasive computing and communications (PerComm '06), Pisa, Italy (pp. 169-179). Washington, DC: IEEE Computer Society.
-
(2006)
Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications (PerComm '06), Pisa, Italy
, pp. 169-179
-
-
Rieback, M.1
Crispo, B.2
Tanenbaum, A.3
-
47
-
-
78650178252
-
-
Riscure Accessed July 2009
-
Riscure (2006). Privacy issue in electronic passport. http://www.riscure.com/contact/privacy-issue-in-electronic-passport.html. Accessed July 2009.
-
(2006)
Privacy Issue in Electronic Passport
-
-
-
48
-
-
33750297493
-
Location verification using secure distance bounding protocols
-
DOI 10.1109/MAHSS.2005.1542879, 1542879, 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS 2005
-
Singlelee, D.; Preneel, B. (2005). Location verification using secure distance bounding protocols. In Proceedings of the 2nd IEEE international conference on mobile, Ad Hoc and sensor systems (MASS'05) (pp. 834-840). New York: IEEE Press. (Pubitemid 44612357)
-
(2005)
2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS 2005
, vol.2005
, pp. 834-840
-
-
Singelee, D.1
Preneel, B.2
-
49
-
-
78650178195
-
Broadcom introduces secure RFID chip
-
29 June 2006
-
Swedberg, C. (2006). Broadcom introduces secure RFID chip. RFID Journal. 29 June 2006. http://rfidjournal.com/article/view/2464/1/1. Accessed July 2009.
-
(2006)
RFID Journal
-
-
Swedberg, C.1
-
51
-
-
33745654539
-
RFID tags for anti-counterfeiting
-
D. Pointcheval (eds). Springer Berlin 10.1007/11605805 Tuyls
-
P Tuyls L Batina 2006 RFID tags for anti-counterfeiting D Pointcheval (eds) Topics in cryptology - CT- RSA 2006, proceedings of the cryptographer's track at the RSA conference 2006, San Jose, CA, USA, February 13-17, 2006 Lecture notes in computer science, security and cryptology 3860 Springer Berlin 115 131 10.1007/11605805 Tuyls, P.; Batina, L. (2006). RFID tags for anti-counterfeiting. In D. Pointcheval (Ed.), Topics in cryptology - CT- RSA 2006, proceedings of the cryptographer's track at the RSA conference 2006, San Jose, CA, USA, February 13-17, 2006. Lecture notes in computer science, security and cryptology (Vol. 3860, pp. 115-131). Berlin: Springer. doi: 10.1007/11605805.
-
(2006)
Topics in Cryptology - CT- RSA 2006, Proceedings of the Cryptographer's Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006 Lecture Notes in Computer Science, Security and Cryptology
, Issue.3860
, pp. 115-131
-
-
Tuyls, P.1
Batina, L.2
-
52
-
-
2942614621
-
-
Master's thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology
-
Weis, S. A. (2003) Security and privacy in radio-frequency identification devices. Master's thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology.
-
(2003)
Security and Privacy in Radio-frequency Identification Devices
-
-
Weis, S.A.1
-
53
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
D. Hutter G. Müller W. Stephan M. Ullmann (eds). Springer Berlin 10.1007/b95124 Weis
-
S Weis S Sarma R Rivest D Engels 2003 Security and privacy aspects of low-cost radio frequency identification systems D Hutter G Müller W Stephan M Ullmann (eds) Security in pervasive computing, proceedings of the 1st international conference in security in pervasive computing, boppard, Germany, March 12-14, 2003 Lecture notes in computer science 2802 Springer Berlin 201 212 10.1007/b95124
-
(2003)
Security in Pervasive Computing, Proceedings of the 1st International Conference in Security in Pervasive Computing, Boppard, Germany, March 12-14, 2003 Lecture Notes in Computer Science
, Issue.2802
, pp. 201-212
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
|