-
5
-
-
47649132152
-
Solving the simultaneous scanning probl em anonymously: Clumping proofs for RF ID tags
-
P. Peris-Lopez, J. C. Hernandez-Castro, Estevez-Tapiador J. M., and Ribagorda A., Solving the simultaneous scanning probl em anonymously: Clumping proofs for RF ID tags, Proc. 3rd International Workshop on SPTPUC'07 2007, pp. 55-60.
-
(2007)
Proc. 3rd International Workshop on SPTPUC'07
, pp. 55-60
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
6
-
-
52949116082
-
Provably Secure Grouping-Proofs for RFID Tags
-
Springer-Verlag LNCS 5189
-
M. Burmester, B. D. Medeiros and R. Motta, Provably Secure Grouping-Proofs for RFID Tags, Proc. 8th International Conference on CARDIS'08 Springer-Verlag, LNCS 5189, 2008, pp. 176-190.
-
(2008)
Proc. 8th International Conference on CARDIS'08
, pp. 176-190
-
-
Burmester, M.1
Medeiros, B.D.2
Motta, R.3
-
7
-
-
38049018446
-
Coexistence proof using chain of timestamps for multiple RFID tags
-
Springer-Verlag LNCS 5189
-
C. C. Lin, Y. C. Lai, J. D. Tygar, C. K. Yang, and Chiang C. L., Coexistence proof using chain of timestamps for multiple RFID tags, Proc. International Workshop on APWeb/WAIM'07 Springer-Verlag, LNCS 5189, 2007, pp. 634-643.
-
(2007)
Proc. International Workshop on APWeb/WAIM'07
, pp. 634-643
-
-
Lin, C.C.1
Lai, Y.C.2
Tygar, J.D.3
Yang, C.K.4
Chiang, C.L.5
-
8
-
-
51849146549
-
Reading order independent grouping proof for RFID tags
-
IEEE Press
-
Y. H. Lien, X. F. Leng, K. Mayes, and J. H. Chiu, Reading order independent grouping proof for RFID tags, Proc. IEEE International Conference on ISI'08 IEEE Press 2004, pp. 128-136.
-
(2004)
Proc. IEEE International Conference on ISI'08
, pp. 128-136
-
-
Lien, Y.H.1
Leng, X.F.2
Mayes, K.3
Chiu, J.H.4
-
10
-
-
33845257701
-
-
MA, USA: Art House
-
Vasilakos, A.V. and Pedrycz, W. 2006. Ambient Intelligence, Wireless Networking, Ubiquitous Computing, MA, USA: Art House.
-
(2006)
Ambient Intelligence, Wireless Networking, Ubiquitous Computing
-
-
Vasilakos, A.V.1
Pedrycz, W.2
-
12
-
-
69449088919
-
A successful in terdisciplinary course on computational intelligence
-
Venayagamoorthy, G. K. 2009. A successful in terdisciplinary course on computational intelligence. IEEE Computational Intelligence Mag., 4(1): 14-23.
-
(2009)
IEEE Computational Intelligence Mag.
, vol.4
, Issue.1
, pp. 14-23
-
-
Venayagamoorthy, G.K.1
-
15
-
-
79959770845
-
Two RFID-based Solutions to Enhance Inpatient Medication Safety
-
Chien, H. Y., Yang, C. C., Wu, T. C. and Lee, C. F. 2011. Two RFID-based Solutions to Enhance Inpatient Medication Safety. J. Med. Syst., 35(3): 369-375.
-
(2011)
J. Med. Syst.
, vol.35
, Issue.3
, pp. 369-375
-
-
Chien, H.Y.1
Yang, C.C.2
Wu, T.C.3
Lee, C.F.4
-
17
-
-
77958582062
-
Strong (n, t, n) verifiable secret sharing scheme
-
H. Lein, L. L. Chang, Strong (n, t, n) verifiable secret sharing scheme, Information Sciences. 180 2010 3059-3064.
-
(2010)
Information Sciences
, Issue.180
, pp. 3059-3064
-
-
Lein, H.1
Chang, L.L.2
-
18
-
-
85062838317
-
Safeguarding cryptographic keys
-
NCC, Arlington, Va. 48
-
G. R. Blakley, Safeguarding cryptographic keys, Proc. AFIPS Conf. NCC, Arlington, Va. 48, 1979, pp. 313-317.
-
(1979)
Proc. AFIPS Conf
, pp. 313-317
-
-
Blakley, G.R.1
-
19
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret, Communications of the ACM. 22 11 1979 612-613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
20
-
-
54349101762
-
LAMED - A PRNG for EPC class-1 generation-2 RFID specification
-
P. Peris-Lopez, J. C. Hernandez-Castro, Estevez-Tapiador J. M., and Ribagorda A., LAMED-A PRNG for EPC class-1 generation-2 RFID specification, Computer Standards and Interfaces. 31 2009 88-97
-
(2009)
Computer Standards and Interfaces
, vol.31
, pp. 88-97
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
|