-
2
-
-
58249105390
-
-
Adam Laurie (2007), 'Rfidiot', http://rfidiot.org/.
-
(2007)
Rfidiot
-
-
Laurie, A.1
-
3
-
-
58249103254
-
Hackers crack new biometric passports
-
Bobbie Johnson (2006), 'Hackers crack new biometric passports', The Guardian.
-
(2006)
The Guardian
-
-
Johnson, B.1
-
5
-
-
85011914435
-
epassports 'at risk' from cloning
-
David Reid (2006), 'epassports 'at risk' from cloning', BBC.
-
(2006)
BBC
-
-
Reid, D.1
-
7
-
-
84871210918
-
Pre-venting attacks on machine readable travel docu-ments (mrtds)
-
Report 2005/404
-
Gaurav S. KcPaul A. Karger (2005), 'Pre-venting attacks on machine readable travel docu-ments (mrtds)', Cryptology ePrint Archive, Report 2005/404. http://eprint.iacr.org/.
-
(2005)
Cryptology ePrint Archive
-
-
Gaurav, S.K.1
Karger, P.A.2
-
8
-
-
84871205804
-
Casper - A compiler for the anal-ysis of security protocols
-
Gavin Lowe (1999), Casper - A compiler for the anal-ysis of security protocols, User Manual and Tuto-rial, Ver1.3.
-
(1999)
User Manual and Tuto-rial, Ver1.3.
-
-
Lowe, G.1
-
9
-
-
84871257925
-
Machine readable travel documents, Part-1
-
ICAO, Specifications for Electronically Enabled Passports with Biometric Identification Capability, ICAO
-
ICAO (2005), Machine readable travel documents, Part-1, Machine Readable Passport Volume 2, Specifications for Electronically Enabled Passports with Biometric Identification Capability, ICAO.
-
(2005)
Machine Readable Passport
, vol.2
-
-
-
12
-
-
0342658605
-
Breaking and fixing the needham-schroeder public-key protocol using csp and fdr
-
of LNCS, Springer-Verlag
-
Lowe, G. (1996), Breaking and fixing the needham-schroeder public-key protocol using csp and fdr, in T. Margaria&B. Steffen, eds, 'Tools and Alogrithms for the Construction and Analysis of Systems', Vol. 1055 of LNCS, Springer-Verlag, pp. 147-166.
-
(1996)
T. Margaria&B. Steffen, eds, 'Tools and Alogrithms for the Construction and Analysis of Systems'
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
15
-
-
0033888070
-
An introduction evaluating biomet-ric systems
-
P. J. Phillips, A. Martin, C. L. Wilson&M. Przy-bocki (2000), 'An introduction evaluating biomet-ric systems', IEEE Computer 33(2), 56-63.
-
(2000)
IEEE Computer
, vol.33
, Issue.2
, pp. 56-63
-
-
Phillips, P.J.1
Martin, A.2
Wilson, C.L.3
Przy-Bocki, M.4
-
16
-
-
0030684956
-
Verifying authentication proto-cols with csp
-
IEEE Computer Society Press
-
S. Schneider (1997), Verifying authentication proto-cols with csp, in '10th IEEE Computer Security Foundations Workshop', IEEE Computer Society Press, pp. 2-17.
-
(1997)
10th IEEE Computer Security Foundations Workshop
, pp. 2-17
-
-
Schneider, S.1
-
17
-
-
58249115288
-
-
Service, A. C. (2006), 'Smartgate', http://www.customs.gov.au/site/page.cfm?u=5555.
-
(2006)
Smartgate
-
-
Service, A.C.1
-
19
-
-
84871257247
-
Hackers clone radio-chip pass-ports
-
Will Knight (2006), 'Hackers clone radio-chip pass-ports', NewScientist.
-
(2006)
NewScientist
-
-
Knight, W.1
-
20
-
-
85028745474
-
Special uses and abuses of the fiat-shamir passport protocol
-
Springer Berlin/Heidelberg
-
Yvo Desmedt, Claude Goutier&Samy Bengio (1987), Special uses and abuses of the fiat-shamir passport protocol, in 'Advances in Cryptology - CRYPTO '87', Vol. 293, Springer Berlin/Heidelberg, pp. 21-39.
-
(1987)
Advances in Cryptology - CRYPTO '87'
, vol.293
, pp. 21-39
-
-
Desmedt, Y.1
Goutier, C.2
Bengio, S.3
|