-
1
-
-
84877605356
-
-
Juniper Research Press release: NFC mobile payments to drive contactless transactions to reach nearly 50 billion worldwide by 2014: New juniper research report
-
Juniper Research, "Press release: NFC mobile payments to drive contactless transactions to reach nearly 50 billion worldwide by 2014: New juniper research report," http://www.juniperresearch.com/viewpressrelease. php?pr=246.
-
-
-
-
2
-
-
84877630633
-
-
Press release: 1 in 5 smartphones will have NFC by 2014, spurred by recent breakthroughs: New juniper research report
-
-, "Press release: 1 in 5 smartphones will have NFC by 2014, spurred by recent breakthroughs: New juniper research report," http://www.juniperresearch.com/viewpressrelease.php?pr=239.
-
-
-
-
6
-
-
79951477401
-
Eavesdropping attacks on high-frequency rfid tokens
-
Budapest, Hungary
-
G. Hancke, "Eavesdropping Attacks on High-Frequency RFID Tokens," RFID Security, Budapest, Hungary, 2008.
-
(2008)
RFID Security
-
-
Hancke, G.1
-
9
-
-
79952390597
-
Arq security in wi-fi and rfid networks
-
M. Elsabagh, Y. Abdallah, M. Youssef, and H. El Gamal, "ARQ security in Wi-Fi and RFID networks," in Forty-Eighth Annual Allerton Conference, September 2010.
-
(2010)
Forty-Eighth Annual Allerton Conference, September
-
-
Elsabagh, M.1
Abdallah, Y.2
Youssef, M.3
El Gamal, H.4
-
10
-
-
80052169777
-
Practical provably secure communication for half-duplex radios
-
A. Elmorsy, M. Yasser, M. Elsabagh, and M. Youssef, "Practical provably secure communication for half-duplex radios," in ICC, 2011.
-
(2011)
ICC
-
-
Elmorsy, A.1
Yasser, M.2
Elsabagh, M.3
Youssef, M.4
-
11
-
-
80051755314
-
Keys through arq: Theory and practice
-
1
-
Y. Abdallah, M. A. Latif, M. Youssef, A. Sultan, and H. E. Gamal, "Keys through arq: Theory and practice," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3-1, pp. 737-751, 2011.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.3
, pp. 737-751
-
-
Abdallah, Y.1
Latif, M.A.2
Youssef, M.3
Sultan, A.4
Gamal, H.E.5
-
12
-
-
77951585015
-
Randomization for security in half-duplex two-way gaussian channels
-
A. E. Gamal, M. Youssef, and H. E. Gamal, "Randomization for security in half-duplex two-way gaussian channels," in GLOBECOM, 2009.
-
(2009)
GLOBECOM
-
-
Gamal, A.E.1
Youssef, M.2
Gamal, H.E.3
-
13
-
-
70449517098
-
On the delay limited secrecy capacity of fading channels
-
K. Khalil, M. Youssef, O. O. Koyluoglu, and H. E. Gamal, "On the delay limited secrecy capacity of fading channels," in ISIT, 2009, pp. 2617-2621.
-
ISIT, 2009
, pp. 2617-2621
-
-
Khalil, K.1
Youssef, M.2
Koyluoglu, O.O.3
Gamal, H.E.4
-
14
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, pp. 656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
15
-
-
0016562514
-
The wire-tap channel
-
January
-
A. D. Wyner, "The wire-tap channel," Bell Systems Technical Journal, vol. 54, no. 8, pp. 1355-1387, January 1975.
-
(1975)
Bell Systems Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
16
-
-
33745771753
-
Noisy tags: A pretty good key exchange protocol for rfid tags
-
Springer
-
C. Castelluccia and G. Avoine, "Noisy tags: A pretty good key exchange protocol for RFID tags," in CARDIS, ser. Lecture Notes in Computer Science, vol. 3928. Springer, 2006, pp. 289-299.
-
(2006)
CARDIS, Ser. Lecture Notes in Computer Science
, vol.3928
, pp. 289-299
-
-
Castelluccia, C.1
Avoine, G.2
-
17
-
-
84877591845
-
Nxp nfc controller pn544 for mobile phones and portable equipment
-
NXP Semiconductors
-
NXP Semiconductors, "NXP NFC controller PN544 for mobile phones and portable equipment," Avaialble online at: http://www.nxp.com/documents/ leaflet/75016890.pdf.
-
Avaialble Online at
-
-
|