-
2
-
-
85019773423
-
Credit Card Skimming: Growing Trend or Media Hype?
-
September, Available on-line at
-
P. Britt. Credit Card Skimming: Growing Trend or Media Hype? Transaction World Magazine, September, 2001. Available on-line at: http://www.transactionworld.com/articles/2001/september/riskmanagement1.asp.
-
(2001)
Transaction World Magazine
-
-
Britt, P.1
-
3
-
-
3242793330
-
Toward An Automated Verification of Certificates of Authenticity
-
D. Kirovski. Toward An Automated Verification of Certificates of Authenticity. ACM Electronic Commerce, pp.160-9, 2004.
-
(2004)
ACM Electronic Commerce
, pp. 160-169
-
-
Kirovski, D.1
-
4
-
-
0034428343
-
IC Identification Circuit Using Device Mismatch
-
K. Lofstrom, W.R. Daasch, and D. Taylor. IC Identification Circuit Using Device Mismatch. IEEE ISSCC, pp.372-373, 2000.
-
(2000)
IEEE ISSCC
, pp. 372-373
-
-
Lofstrom, K.1
Daasch, W.R.2
Taylor, D.3
-
6
-
-
4544381402
-
A technique to build a secret key in integrated circuits with identification and authentication applications
-
J.-W. Lee, D. Lim, B. Gassend, G.E. Suh, M. van Dijk, and S. Devadas. A technique to build a secret key in integrated circuits with identification and authentication applications. IEEE VLSI Circuits Symposium, 2004.
-
(2004)
IEEE VLSI Circuits Symposium
-
-
Lee, J.-W.1
Lim, D.2
Gassend, B.3
Suh, G.E.4
van Dijk, M.5
Devadas, S.6
-
8
-
-
76649124351
-
Strong Authentication with Physical Unclonable Functions
-
M. Petković, W. Jonker (Eds), "Data-Centric Systems and Applications, Springer
-
P. Tuyls and B. Škorić. Strong Authentication with Physical Unclonable Functions. In "Security, Privacy and Trust in Modern Data Management," M. Petković, W. Jonker (Eds.), "Data-Centric Systems and Applications," Springer, 2007.
-
(2007)
Security, Privacy and Trust in Modern Data Management
-
-
Tuyls, P.1
Škorić, B.2
-
9
-
-
84939573910
-
Differential Power Analysis
-
P. Kocher, J. Jaffe and B. Jun. Differential Power Analysis. CRYPTO, pp.388-397, 1999.
-
(1999)
CRYPTO
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
11
-
-
38049025704
-
RF-DNA: Radio-Frequency Certificates of Authenticity. Cryptographic Hardware and Embedded Systems
-
G. DeJean and D. Kirovski. RF-DNA: Radio-Frequency Certificates of Authenticity. Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, Vol.4727, pp.346-363, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4727
, pp. 346-363
-
-
DeJean, G.1
Kirovski, D.2
-
12
-
-
84947906522
-
The exact security of digital signatures how to sign with RSA and Rabin
-
M. Bellare and P. Rogaway. The exact security of digital signatures how to sign with RSA and Rabin. EUROCRYPT, pp.399-414, 1996.
-
(1996)
EUROCRYPT
, pp. 399-414
-
-
Bellare, M.1
Rogaway, P.2
-
13
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R.L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, Vol.21, (no.2), pp.120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
21
-
-
57349155782
-
Certifying Authenticity via Fiber-Infused Paper
-
Y. Chen, M.K. Mihcak, and D. Kirovski. Certifying Authenticity via Fiber-Infused Paper. ACM SIGecom Exchanges, Vol.5, (no.3), pp.29-37, 2005.
-
(2005)
ACM SIGecom Exchanges
, vol.5
, Issue.3
, pp. 29-37
-
-
Chen, Y.1
Mihcak, M.K.2
Kirovski, D.3
-
23
-
-
0037144430
-
Physical One-Way Functions
-
R. Pappu, et al. Physical One-Way Functions. Science, Vol.297, (no.5589), pp.2026-30, 2002.
-
(2002)
Science
, vol.297
, Issue.5589
, pp. 2026-2030
-
-
Pappu, R.1
-
25
-
-
79951849981
-
RFID Fibers for Secure Applications
-
Available on-line at
-
J. Collins. RFID Fibers for Secure Applications. RFID Journal, 2004. Available on-line at: http://www.rfidjournal.com/article/articleview/845/1/14.
-
(2004)
RFID Journal
-
-
Collins, J.1
-
26
-
-
77957760890
-
-
CrossID, Inc. Available on-line at
-
CrossID, Inc. Firewall Protection for Paper Documents. Available on-line at: http://www.rfidjournal.com/article/articleview/790/1/44.
-
Firewall Protection for Paper Documents
-
-
-
27
-
-
85174572042
-
-
Inkode, Inc. Available on-line at
-
Inkode, Inc. Available on-line at: http://www.inkode.com.
-
-
-
-
28
-
-
85174606782
-
-
Creo, Inc. Available on-line at
-
Creo, Inc. Available on-line at: http://www.creo.com.
-
-
-
-
29
-
-
85174569507
-
-
Available on-line at
-
RF SAW, Inc. Available on-line at: http://www.rfsaw.com/tech.html
-
-
-
-
31
-
-
84980070137
-
Uber die Wechrelwirkung zwischen zwei elektrischen Dipolen und uber die Drehung der Polarisationsebene in Kristallen und Flussigkeiten
-
C.W. Oseen. Uber die Wechrelwirkung zwischen zwei elektrischen Dipolen und uber die Drehung der Polarisationsebene in Kristallen und Flussigkeiten. Ann. der Physik, Vol.48; pp. 1-56, 1915.
-
(1915)
Ann. der Physik
, vol.48
, pp. 1-56
-
-
Oseen, C.W.1
-
32
-
-
0002454663
-
A generalized extinction theorem and its role in scattering theory
-
L. Mandel and E. Wolf (eds), Plenum, New York
-
E. Wolf. A generalized extinction theorem and its role in scattering theory. Coherence and Quantum Optics, L. Mandel and E. Wolf (eds.), Plenum, New York, 1973.
-
(1973)
Coherence and Quantum Optics
-
-
Wolf, E.1
-
33
-
-
29444458699
-
Three-dimensional electromagnetic modelling and inversion: from theory to application
-
D.B. Avdeev. Three-dimensional electromagnetic modelling and inversion: from theory to application. Surveys in Geophysics, Vol.26, pp.767-799, 2005.
-
(2005)
Surveys in Geophysics
, vol.26
, pp. 767-799
-
-
Avdeev, D.B.1
-
35
-
-
85174605102
-
-
October 2000 February 2001. Available on-line at
-
Microwave Engineering Europe. CAD benchmark. October 2000 - February 2001. Available on-line at: http://i.cmpnet.com/edtn/europe/mwee/pdf/CAD.pdf
-
CAD benchmark
-
-
|