-
1
-
-
80053511717
-
Design of cryptographic devices resilient to fault injection attacks using nonlinear robust codes
-
Akdemir, K. D., Wang, Z., Karpovsky, M. G., Sunar, B.: Design of cryptographic devices resilient to fault injection attacks using nonlinear robust codes. In: Fault Analysis in Cryptography (2011).
-
(2011)
Fault Analysis in Cryptography
-
-
Akdemir, K.D.1
Wang, Z.2
Karpovsky, M.G.3
Sunar, B.4
-
2
-
-
80051967839
-
A formal foundation for the security features of physical functions
-
IEEE Computer Society, New York
-
Armknecht, F., Maes, R., Sadeghi, A. R., Standaert, F. X., Wachsmann, C.: A formal foundation for the security features of physical functions. In: IEEE Symposium on Security and Privacy, pp. 397-412. IEEE Computer Society, New York (2011).
-
(2011)
IEEE Symposium on Security and Privacy
, pp. 397-412
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.R.3
Standaert, F.X.4
Wachsmann, C.5
-
3
-
-
72449124251
-
Memory leakage-resilient encryption based on physically unclonable functions
-
Armknecht, F., Maes, R., Sadeghi, A. R., Sunar, B., Tuyls, P.: Memory leakage-resilient encryption based on physically unclonable functions. In: Advances in Cryptology (ASIACRYPT). LNCS, vol. 5912, pp. 685-702 (2009).
-
(2009)
Advances in Cryptology (ASIACRYPT). LNCS
, vol.5912
, pp. 685-702
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.R.3
Sunar, B.4
Tuyls, P.5
-
4
-
-
78650151843
-
On RFID privacy with mutual authentication and tag corruption
-
Springer, Heidelberg
-
Armknecht, F., Sadeghi, A. R., Visconti, I., Wachsmann, C.: On RFID privacy with mutual authentication and tag corruption. In: International Conference on Applied Cryptography and Network Security (ACNS). LNCS, vol. 6123, pp. 493-510. Springer, Heidelberg (2010).
-
(2010)
International Conference on Applied Cryptography and Network Security (ACNS). LNCS
, vol.6123
, pp. 493-510
-
-
Armknecht, F.1
Sadeghi, A.R.2
Visconti, I.3
Wachsmann, C.4
-
5
-
-
37149045263
-
PRESENT: an ultra-lightweight block cipher
-
Springer, Berlin
-
Bogdanov, A., Knudsen, L., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Cryptographic Hardware and Embedded Systems (CHES). LNCS, vol. 4727, pp. 450-466. Springer, Berlin (2007).
-
(2007)
Cryptographic Hardware and Embedded Systems (CHES). LNCS
, vol.4727
, pp. 450-466
-
-
Bogdanov, A.1
Knudsen, L.2
Leander, G.3
Paar, C.4
Poschmann, A.5
Robshaw, M.6
Seurin, Y.7
Vikkelsoe, C.8
-
7
-
-
84887213564
-
-
Calypso Networks Association
-
Calypso Networks Association: http://www. calypsonet-asso. org/ (2011).
-
(2011)
-
-
-
8
-
-
58149096831
-
-
Cryptology ePrint Archive, Report 2008/166
-
Courtois, N. T., Nohl, K., O'Neil, S.: Algebraic attacks on the Crypto-1 stream cipher in MiFare Classic and Oyster Cards. Cryptology ePrint Archive, Report 2008/166 (2008).
-
(2008)
Algebraic attacks on the Crypto-1 stream cipher in MiFare Classic and Oyster Cards
-
-
Courtois, N.T.1
Nohl, K.2
O'Neil, S.3
-
9
-
-
84873433835
-
Fuzzy Extractors
-
Springer, Berlin
-
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors. In: Security with Noisy Data, pp. 79-99. Springer, Berlin (2007).
-
(2007)
Security with Noisy Data
, pp. 79-99
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
10
-
-
80755167790
-
Logically reconfigurable PUFs: memory-based secure key storage
-
ACM Press, New York
-
Eichhorn, I., Koeberl, P., van der Leest, V.: Logically reconfigurable PUFs: memory-based secure key storage. In: ACM Workshop on Scalable Trusted Computing (ACM STC). ACM Press, New York (2011).
-
(2011)
ACM Workshop on Scalable Trusted Computing (ACM STC)
-
-
Eichhorn, I.1
Koeberl, P.2
van der Leest, V.3
-
11
-
-
84887213423
-
-
European Commission: Waste electrical and electronic equipment website
-
European Commission: Waste electrical and electronic equipment website. http://ec. europa. eu/environment/waste/weee/index_en. htm (2011).
-
(2011)
-
-
-
12
-
-
57049128814
-
Dismantling MiFare classic
-
In: Jajodia, S., Lopez, J. (eds.), Springer, Berlin
-
Garcia, F. D., de Koning Gans, G., Muijrers, R., van Rossum, P., Verdult, R., Schreur, R. W., Jacobs, B.: Dismantling MiFare classic. In: Jajodia, S., Lopez, J. (eds.) 13th European Symposium on Research in Computer Security (ESORICS). LNCS, vol. 5283, pp. 97-114. Springer, Berlin (2008).
-
(2008)
13th European Symposium on Research in Computer Security (ESORICS). LNCS
, vol.5283
, pp. 97-114
-
-
Garcia, F.D.1
de Koning Gans, G.2
Muijrers, R.3
van Rossum, P.4
Verdult, R.5
Schreur, R.W.6
Jacobs, B.7
-
13
-
-
46449138830
-
Controlled physical random functions
-
IEEE Computer Society, New York
-
Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Controlled physical random functions. In: Computer Security Applications Conference, pp. 149-160. IEEE Computer Society, New York (2002).
-
(2002)
Computer Security Applications Conference
, pp. 149-160
-
-
Gassend, B.1
Clarke, D.2
van Dijk, M.3
Devadas, S.4
-
14
-
-
0038341105
-
Silicon physical random functions
-
Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: ACM Conference on Computer and Communications Security (ACM CCS), pp. 148-160 (2002).
-
(2002)
ACM Conference on Computer and Communications Security (ACM CCS)
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
van Dijk, M.3
Devadas, S.4
-
15
-
-
4344587804
-
Identification and authentication of integrated circuits: research articles
-
Gassend B., Lim D., Clarke D., van Dijk M., Devadas S.: Identification and authentication of integrated circuits: research articles. Concurr. Comput. Pr. Exp. 16(11), 1077-1098 (2004).
-
(2004)
Concurr. Comput. Pr. Exp.
, vol.16
, Issue.11
, pp. 1077-1098
-
-
Gassend, B.1
Lim, D.2
Clarke, D.3
van Dijk, M.4
Devadas, S.5
-
16
-
-
38049015807
-
FPGA intrinsic PUFs and their use for IP protection
-
Springer, Berlin
-
Guajardo, J., Kumar, S., Schrijen, G. J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Cryptographic Hardware and Embedded Systems, CHES 2007. Lecture Notes in Computer Science, vol. 4727, pp. 63-80. Springer, Berlin (2007).
-
(2007)
Cryptographic Hardware and Embedded Systems, CHES 2007. Lecture Notes in Computer Science
, vol.4727
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.2
Schrijen, G.J.3
Tuyls, P.4
-
17
-
-
51749089495
-
Brand and IP protection with physical unclonable functions
-
Guajardo, J., Kumar, S., Schrijen, G. J., Tuyls, P.: Brand and IP protection with physical unclonable functions. In: IEEE International Symposium on Circuits and Systems, ISCAS 2008, pp. 3186-3189 (2008).
-
(2008)
IEEE International Symposium on Circuits and Systems, ISCAS 2008
, pp. 3186-3189
-
-
Guajardo, J.1
Kumar, S.2
Schrijen, G.J.3
Tuyls, P.4
-
18
-
-
38049015807
-
FPGA intrinsic PUFs and their use for IP protection
-
Guajardo, J., Kumar, S. S., Schrijen, G. J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES). LNCS, vol. 4727, pp. 63-80 (2007).
-
(2007)
Workshop on Cryptographic Hardware and Embedded Systems (CHES). LNCS
, vol.4727
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.J.3
Tuyls, P.4
-
20
-
-
84887213254
-
-
Intrinsic ID: Product webpage
-
Intrinsic ID: Product webpage. http://www. intrinsic-id. com/products. htm (2011).
-
(2011)
-
-
-
21
-
-
33144457479
-
RFID security and privacy: a research survey
-
Juels A.: RFID security and privacy: a research survey. J. Sel. Areas Commun. 24(2), 381-395 (2006).
-
(2006)
J. Sel. Areas Commun.
, vol.24
, Issue.2
, pp. 381-395
-
-
Juels, A.1
-
22
-
-
80053494509
-
-
Katzenbeisser, S., Kocabaş, U., van der Leest, V., Sadeghi, A. R., Schrijen, G. J., Schröder, H., Wachsmann, C.: Recyclable PUFs: logically reconfigurable PUFs (full version). http://www. trust. cased. de/ (2011).
-
(2011)
Recyclable PUFs: Logically reconfigurable PUFs (full version)
-
-
Katzenbeisser, S.1
Kocabaş, U.2
van der Leest, V.3
Sadeghi, A.R.4
Schrijen, G.J.5
Schröder, H.6
Wachsmann, C.7
-
23
-
-
51849144293
-
Extended abstract: the butterfly PUF protecting IP on every FPGA
-
Kumar, S., Guajardo, J., Maes, R., Schrijen, G. J., Tuyls, P.: Extended abstract: the butterfly PUF protecting IP on every FPGA. In: IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2008, pp. 67-70 (2008).
-
(2008)
IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2008
, pp. 67-70
-
-
Kumar, S.1
Guajardo, J.2
Maes, R.3
Schrijen, G.J.4
Tuyls, P.5
-
24
-
-
51849144293
-
Extended abstract: the butterfly PUF protecting IP on every FPGA
-
Kumar, S., Guajardo, J., Maes, R., Schrijen, G. J., Tuyls, P.: Extended abstract: the butterfly PUF protecting IP on every FPGA. In: IEEE Workshop on Hardware-Oriented Security and Trust (HOST), pp. 67-70 (2008).
-
(2008)
IEEE Workshop on Hardware-Oriented Security and Trust (HOST)
, pp. 67-70
-
-
Kumar, S.1
Guajardo, J.2
Maes, R.3
Schrijen, G.J.4
Tuyls, P.5
-
25
-
-
70449096107
-
Reconfigurable physical unclonable functions-enabling technology for tamper-resistant storage
-
IEEE Computer Society, San Francisco
-
Kursawe, K., Sadeghi, A. R., Schellekens, D., Tuyls, P., Scoric, B.: Reconfigurable physical unclonable functions-enabling technology for tamper-resistant storage. In: IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), pp. 22-29. IEEE Computer Society, San Francisco (2009).
-
(2009)
IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)
, pp. 22-29
-
-
Kursawe, K.1
Sadeghi, A.R.2
Schellekens, D.3
Tuyls, P.4
Scoric, B.5
-
26
-
-
84985820553
-
Hash functions based on block ciphers
-
In: Rueppel, R. (ed.), Springer, Berlin
-
Lai, X., Massey, J.: Hash functions based on block ciphers. In: Rueppel, R. (ed.) Advances in Cryptology (EUROCRYPT). LNCS, vol. 658, pp. 55-70. Springer, Berlin (1993).
-
(1993)
Advances in Cryptology (EUROCRYPT). LNCS
, vol.658
, pp. 55-70
-
-
Lai, X.1
Massey, J.2
-
28
-
-
4544381402
-
A technique to build a secret key in integrated circuits for identification and authentication application
-
Lee, J. W., Lim, D., Gassend, B., Suh, G. E., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication application. In: Symposium on VLSI Circuits, pp. 176-159 (2004).
-
(2004)
Symposium on VLSI Circuits
, pp. 159-176
-
-
Lee, J.W.1
Lim, D.2
Gassend, B.3
Suh, G.E.4
van Dijk, M.5
Devadas, S.6
-
29
-
-
78650185683
-
Hardware intrinsic security from D flip-flops
-
van der Leest, V., Schrijen, G. J., Handschuh, H., Tuyls, P.: Hardware intrinsic security from D flip-flops. In: ACM Workshop on Scalable Trusted Computing (ACM STC), pp. 53-62 (2010).
-
(2010)
ACM Workshop on Scalable Trusted Computing (ACM STC)
, pp. 53-62
-
-
van der Leest, V.1
Schrijen, G.J.2
Handschuh, H.3
Tuyls, P.4
-
30
-
-
84887212756
-
-
Letter from Dutch minister on OV-chipkaart
-
Letter from Dutch minister on OV-chipkaart. http://zoek. officielebekendmakingen. nl/dossier/32440/kst-23645-415. html.
-
-
-
-
32
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
Lim D., Lee J. W., Gassend B., Suh G. E., van Dijk M., Devadas S.: Extracting secret keys from integrated circuits. IEEE Trans. VLSI Syst. 13(10), 1200-1205 (2005).
-
(2005)
IEEE Trans. VLSI Syst.
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.W.2
Gassend, B.3
Suh, G.E.4
van Dijk, M.5
Devadas, S.6
-
33
-
-
77957943386
-
Low-power sub-threshold design of secure physical unclonable functions
-
Lin, L., Holcomb, D., Krishnappa, D. K., Shabadi, P., Burleson, W.: Low-power sub-threshold design of secure physical unclonable functions. In: ACM/IEEE International Symposium on Low Power Electronics and Design (ISLPED), pp. 43-48 (2010).
-
(2010)
ACM/IEEE International Symposium on Low Power Electronics and Design (ISLPED)
, pp. 43-48
-
-
Lin, L.1
Holcomb, D.2
Krishnappa, D.K.3
Shabadi, P.4
Burleson, W.5
-
34
-
-
77949345944
-
Intrinsic PUFs from flip-flops on reconfigurable devices
-
Maes, R., Tuyls, P., Verbauwhede, I.: Intrinsic PUFs from flip-flops on reconfigurable devices. In: Workshop on Information and System Security (WISSec), p. 17 (2008).
-
(2008)
Workshop on Information and System Security (WISSec)
, pp. 17
-
-
Maes, R.1
Tuyls, P.2
Verbauwhede, I.3
-
35
-
-
85016215043
-
Physically unclonable functions: a study on the state of the art and future research directions
-
A. R. Sadeghi and D. Naccache (Eds.), Berlin: Springer
-
Maes R., Verbauwhede I.: Physically unclonable functions: a study on the state of the art and future research directions. In: Sadeghi, A. R., Naccache, D. (eds) Towards Hardware-Intrinsic Security, Information Security and Cryptography, pp. 3-37. Springer, Berlin (2010).
-
(2010)
Towards Hardware-Intrinsic Security, Information Security and Cryptography
, pp. 3-37
-
-
Maes, R.1
Verbauwhede, I.2
-
36
-
-
77955766025
-
A large scale characterization of RO-PUF
-
Maiti, A., Casarona, J., McHale, L., Schaumont, P.: A large scale characterization of RO-PUF. In: IEEE Symposium on Hardware-Oriented Security and Trust (HOST), pp. 94-99 (2010).
-
(2010)
IEEE Symposium on Hardware-Oriented Security and Trust (HOST)
, pp. 94-99
-
-
Maiti, A.1
Casarona, J.2
McHale, L.3
Schaumont, P.4
-
37
-
-
33747614000
-
Designing resistant circuits against malicious faults injection using asynchronous logic
-
Monnet Y., Renaudin M., Leveugle R.: Designing resistant circuits against malicious faults injection using asynchronous logic. IEEE Trans. Comput. 55, 1104-1115 (2006).
-
(2006)
IEEE Trans. Comput.
, vol.55
, pp. 1104-1115
-
-
Monnet, Y.1
Renaudin, M.2
Leveugle, R.3
-
39
-
-
84887212690
-
-
NXP Semiconductors: MiFare applications
-
NXP Semiconductors: MiFare applications. http://www. mifare. net/applications/ (2011).
-
(2011)
-
-
-
40
-
-
84887213225
-
-
NXP Semiconductors: MiFare smartcard ICs
-
NXP Semiconductors: MiFare smartcard ICs. http://www. mifare. net/products/smartcardics/ (2011).
-
(2011)
-
-
-
41
-
-
84887213428
-
-
Octopus Holdings
-
Octopus Holdings. http://www. octopus. com. hk/en/ (2011).
-
(2011)
-
-
-
42
-
-
84887213550
-
-
OV-Chipkaart
-
OV-Chipkaart. http://www. ov-chipkaart. nl/ (2011).
-
(2011)
-
-
-
43
-
-
49149115221
-
Towards robust low cost authentication for pervasive devices
-
IEEE Computer Society, New York
-
Öztürk, E., Hammouri, G., Sunar, B.: Towards robust low cost authentication for pervasive devices. In: IEEE International Conference on Pervasive Computing and Communications (PERCOM'08), pp. 170-178. IEEE Computer Society, New York (2008).
-
(2008)
IEEE International Conference on Pervasive Computing and Communications (PERCOM'08)
, pp. 170-178
-
-
Öztürk, E.1
Hammouri, G.2
Sunar, B.3
-
44
-
-
0037144430
-
Physical one-way functions
-
Pappu R. S., Recht B., Taylor J., Gershenfeld N.: Physical one-way functions. Science 297, 2026-2030 (2002).
-
(2002)
Science
, vol.297
, pp. 2026-2030
-
-
Pappu, R.S.1
Recht, B.2
Taylor, J.3
Gershenfeld, N.4
-
46
-
-
78649989155
-
Modeling attacks on physical unclonable functions
-
Rührmair, U., Sehnke, F., Sölter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling attacks on physical unclonable functions. In: ACM conference on Computer and communications security (ACM CCS), pp. 237-249 (2010).
-
(2010)
ACM conference on Computer and communications security (ACM CCS)
, pp. 237-249
-
-
Rührmair, U.1
Sehnke, F.2
Sölter, J.3
Dror, G.4
Devadas, S.5
Schmidhuber, J.6
-
47
-
-
79959233386
-
PUF-enhanced RFID security and privacy
-
In: Sadeghi, A. R., Naccache, D. (eds.), Springer, Berlin
-
Sadeghi, A. R., Visconti, I., Wachsmann, C.: PUF-enhanced RFID security and privacy. In: Sadeghi, A. R., Naccache, D. (eds.) Towards Hardware-Intrinsic Security, Information Security and Cryptography, pp 3-37. Springer, Berlin (2010).
-
(2010)
Towards Hardware-Intrinsic Security, Information Security and Cryptography
, pp. 3-37
-
-
Sadeghi, A.R.1
Visconti, I.2
Wachsmann, C.3
-
48
-
-
70349143010
-
-
Schreur, R. W., van Rossum, P., Garcia, F., Teepe, W., Hoepman, J. H., Jacobs, B., de Koning Gans, G., Verdult, R., Muijrers, R., Kali, R., Kali, V.: Security flaw in MiFare Classic. http://www. sos. cs. ru. nl/applications/rfid/pressrelease. en. html (2008).
-
(2008)
Security flaw in MiFare Classic
-
-
Schreur, R.W.1
van Rossum, P.2
Garcia, F.3
Teepe, W.4
Hoepman, J.H.5
Jacobs, B.6
de Koning Gans, G.7
Verdult, R.8
Muijrers, R.9
Kali, R.10
Kali, V.11
-
49
-
-
80051877491
-
Short paper: lightweight remote attestation using physical functions
-
ACM, New York
-
Schulz, S., Sadeghi, A. R., Wachsmann, C.: Short paper: lightweight remote attestation using physical functions. In: Proceedings of the fourth ACM conference on Wireless network security, WiSec '11, pp. 109-114. ACM, New York (2011).
-
(2011)
Proceedings of the fourth ACM conference on Wireless network security, WiSec '11
, pp. 109-114
-
-
Schulz, S.1
Sadeghi, A.R.2
Wachsmann, C.3
-
53
-
-
34548818732
-
A 1. 6pJ/bit96% stable chip-ID generating circuit using process variations
-
Su, Y., Holleman, J., Otis, B.: A 1. 6pJ/bit96% stable chip-ID generating circuit using process variations. In: IEEE International Solid-State Circuits Conference (ISSCC), pp. 406-611 (2007).
-
(2007)
IEEE International Solid-State Circuits Conference (ISSCC)
, pp. 406-611
-
-
Su, Y.1
Holleman, J.2
Otis, B.3
-
54
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
Suh, G. E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Design Automation Conference, pp. 9-14 (2007).
-
(2007)
Design Automation Conference
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
55
-
-
33745654539
-
RFID-tags for anti-counterfeiting
-
San Jose, CA, USA, February 13-17, 2005, Proceedings. Lecture Notes on Computer Science (LNCS), Springer, Berlin
-
Tuyls, P., Batina, L.: RFID-tags for anti-counterfeiting. In: The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005, Proceedings. Lecture Notes on Computer Science (LNCS), vol. 3860, pp. 115-131. Springer, Berlin (2006).
-
(2006)
The Cryptographers' Track at the RSA Conference 2006
, vol.3860
, pp. 115-131
-
-
Tuyls, P.1
Batina, L.2
-
56
-
-
33750726983
-
Read-proof hardware from protective coatings
-
Tuyls, P., Schrijen, G. J., Škorić, B., van Geloven, J., Verhaegh, N., Wolters, R.: Read-proof hardware from protective coatings. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES). LNCS, vol. 4249, pp. 369-383 (2006).
-
(2006)
Workshop on Cryptographic Hardware and Embedded Systems (CHES). LNCS
, vol.4249
, pp. 369-383
-
-
Tuyls, P.1
Schrijen, G.J.2
Škorić, B.3
van Geloven, J.4
Verhaegh, N.5
Wolters, R.6
-
57
-
-
84887213854
-
-
Verayo, Inc.: Product webpage
-
Verayo, Inc.: Product webpage. http://www. verayo. com/product/products. html (2011).
-
(2011)
-
-
-
58
-
-
26444544536
-
Robust key extraction from physical uncloneable functions
-
Škorić, B., Tuyls, P., Ophey, W.: Robust key extraction from physical uncloneable functions. In: Applied Cryptography and Network Security (ACNS). LNCS, vol. 3531, pp. 407-422 (2005).
-
(2005)
Applied Cryptography and Network Security (ACNS). LNCS
, vol.3531
, pp. 407-422
-
-
Škorić, B.1
Tuyls, P.2
Ophey, W.3
-
59
-
-
21144438831
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Springer, Berlin
-
Weis, S. A., Sarma, S. E., Rivest, R. L., Engels, D. W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Proceedings of PerCom. LNCS, vol. 2802, pp. 50-59. Springer, Berlin (2003).
-
(2003)
Proceedings of PerCom. LNCS
, vol.2802
, pp. 50-59
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
60
-
-
84887213737
-
-
Wikipedia: OV-Chipkaart
-
Wikipedia: OV-Chipkaart (2011) http://en. wikipedia. org/wiki/OV-chipkaart.
-
(2011)
-
-
|