-
1
-
-
77956289280
-
Integrating RFID on event-based hemispheric imaging for internet of things assistive applications
-
June 23-25, Samos, Greece
-
V. Kolias, I. Giannoukos, C. Anagnostopoulos, I. Anagnostopoulos, V. Loumos and E. Kayafas, "Integrating RFID on event-based hemispheric imaging for internet of things assistive applications", Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments, (2010) June 23-25; Samos, Greece.
-
(2010)
Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments
-
-
Kolias, V.1
Giannoukos, I.2
Anagnostopoulos, C.3
Anagnostopoulos, I.4
Loumos, V.5
Kayafas, E.6
-
2
-
-
84864770770
-
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
-
X. Zhao and X. Wand, "Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks", International Journal of Advanced Science and Technology. Vol. 2, (2009) January.
-
(2009)
International Journal of Advanced Science and Technology
, vol.2
-
-
Zhao, X.1
Wand, X.2
-
3
-
-
84864745121
-
A study of the random oracle model
-
California, USA: University of California at Davis
-
G. Martin, "A study of the random oracle model", California, USA: University of California at Davis, (2008).
-
(2008)
-
-
Martin, G.1
-
4
-
-
2942590116
-
RFID systems and security and privacy implications
-
August 13-15, CA, USA
-
S. E. Sarma, S. A. Weis and D. W. Engels, "RFID systems and security and privacy implications", Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems, (2002) August 13-15; CA, USA.
-
(2002)
Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems
-
-
Sarma, S.E.1
Weis, S.A.2
Engels, D.W.3
-
5
-
-
21144438831
-
Security and privacy aspects of low-cost radio frequency identification systems
-
March 12-14, Boppard, Germany
-
S. A. Weis, S. E. Sarma, R. L. Rivest and D. W. Engels, "Security and privacy aspects of low-cost radio frequency identification systems", Proceedings of the 1st International Conference on Security in Pervasive Computing, (2003) March 12-14, Boppard, Germany.
-
(2003)
Proceedings of the 1st International Conference on Security in Pervasive Computing
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
6
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
October 25-29, Washington, DC, USA
-
D. Molnar and D. Wagner, "Privacy and security in library RFID: Issues, practices, and architectures", Proceedings of the 11th ACM Conference on Computer and Communications Security, (2004) October 25-29; Washington, DC,USA.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security
-
-
Molnar, D.1
Wagner, D.2
-
7
-
-
85012989086
-
An efficient and secure RFID security method with ownership transfer
-
November 3-6, Guangzhou, China
-
K. Osaka, T. Takagi, K. Yamazaki and O. Takahashi, "An efficient and secure RFID security method with ownership transfer", Proceedings of International Conference on Computational Intelligence and Security, (2006) November 3-6; Guangzhou, China.
-
(2006)
Proceedings of International Conference on Computational Intelligence and Security
-
-
Osaka, K.1
Takagi, T.2
Yamazaki, K.3
Takahashi, O.4
-
8
-
-
49049105964
-
EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol
-
April 16-17, Las Vegas, Nevada, USA
-
Y. K. Lee, L. Batina and I. Verbauwhede, "EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol", Proceedings of IEEE International Conference on RFID, (2008) April 16-17; Las Vegas, Nevada, USA.
-
(2008)
Proceedings of IEEE International Conference on RFID
-
-
Lee, Y.K.1
Batina, L.2
Verbauwhede, I.3
-
10
-
-
77956578953
-
Scalable RFID systems: a privacy-preserving protocol with constant-time identification
-
June 28-July 1, Chicago, USA
-
B. Alomair, A. Clark, J. Cuellar and R. Poovendran, "Scalable RFID systems: a privacy-preserving protocol with constant-time identification", Proceedings of the International Conference on Dependable Systems and Networks, (2010) June 28-July 1, Chicago, USA.
-
(2010)
Proceedings of the International Conference on Dependable Systems and Networks
-
-
Alomair, B.1
Clark, A.2
Cuellar, J.3
Poovendran, R.4
-
12
-
-
84860387357
-
A Comparative Study of Various Security Approaches Used in Wireless Sensor Networks
-
K. Sharma, M. K. Ghose, D. Kumar, R. P. K. Singh and V. K. Pandey, "A Comparative Study of Various Security Approaches Used in Wireless Sensor Networks", International Journal of Advanced Science and Technology, Vol. 17, (2010) April.
-
(2010)
International Journal of Advanced Science and Technology
, vol.17
-
-
Sharma, K.1
Ghose, M.K.2
Kumar, D.3
Singh, R.P.K.4
Pandey, V.K.5
|