-
2
-
-
84966382478
-
Bluetooth secure simple pairing using nfc
-
Bluetooth secure simple pairing using nfc. In NFC Forum, 2012.
-
(2012)
NFC Forum
-
-
-
3
-
-
84866392524
-
Strengths and weaknesses of near field communication (nfc) technology
-
M. M. A. Allah. Strengths and weaknesses of near field communication (nfc) technology. In Global Journal of Computer Science and Technology, volume 3, pages 51-56, 2011.
-
(2011)
Global Journal of Computer Science and Technology
, vol.3
, pp. 51-56
-
-
Allah, M.M.A.1
-
4
-
-
84860677467
-
Link budget and capacity performance of inductively coupled resonant loops
-
U. Azad, H. Jing, and Y. Wang. Link budget and capacity performance of inductively coupled resonant loops. In Antennas and Propagation, IEEE Transactions on, volume 60, pages 2453-2461, 2012.
-
(2012)
Antennas and Propagation, IEEE Transactions on
, vol.60
, pp. 2453-2461
-
-
Azad, U.1
Jing, H.2
Wang, Y.3
-
5
-
-
34547688845
-
Public-key cryptography for RFID-tags
-
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede. Public-key cryptography for rfid-tags. In Pervasive Computing and Communications Workshops, 2007. PerCom Workshops '07. Fifth Annual IEEE International Conference on, pages 217-222, 2007.
-
(2007)
Pervasive Computing and Communications Workshops, 2007. PerCom Workshops '07. Fifth Annual IEEE International Conference on
, pp. 217-222
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
6
-
-
84891596482
-
Full duplex radios
-
New York, NY, USA, Aug. ACM
-
D. Bharadia, E. McMilin, and S. Katti. Full duplex radios. In SIGCOMM Comput. Commun. Rev., volume 43, pages 375-386, New York, NY, USA, Aug. 2013. ACM.
-
(2013)
SIGCOMM Comput. Commun. Rev
, vol.43
, pp. 375-386
-
-
Bharadia, D.1
McMilin, E.2
Katti, S.3
-
7
-
-
33745771753
-
Noisy tags: A pretty good key exchange protocol for RFID tags
-
J. Domingo-Ferrer, J. Posegga, and D. Schreckling, editors 3928 of Lecture Notes in Computer Science, Springer Berlin Heidelberg
-
C. Castelluccia and G. Avoine. Noisy tags: A pretty good key exchange protocol for rfid tags. In J. Domingo-Ferrer, J. Posegga, and D. Schreckling, editors, Smart Card Research and Advanced Applications, volume 3928 of Lecture Notes in Computer Science, pages 289-299. Springer Berlin Heidelberg, 2006.
-
(2006)
Smart Card Research and Advanced Applications
, pp. 289-299
-
-
Castelluccia, C.1
Avoine, G.2
-
9
-
-
50249176295
-
Maximalist cryptography and computation on the wisp uhf RFID tag
-
J. R. Smith, editor Springer New York
-
H.-J. Chae, M. Salajegheh, D. Yeager, J. Smith, and K. Fu. Maximalist cryptography and computation on the wisp uhf rfid tag. In J. R. Smith, editor, Wirelessly Powered Sensor Networks and Computational RFID, pages 175-187. Springer New York, 2013.
-
(2013)
Wirelessly Powered Sensor Networks and Computational RFID
, pp. 175-187
-
-
Chae, H.-J.1
Salajegheh, M.2
Yeager, D.3
Smith, J.4
Fu, K.5
-
11
-
-
56749174919
-
On the energy cost of communication and cryptography in wireless sensor networks
-
G. de Meulenaer, F. Gosset, O.-X. Standaert, and O. Pereira. On the energy cost of communication and cryptography in wireless sensor networks. In Networking and Communications, 2008. WIMOB '08. IEEE International Conference on Wireless and Mobile Computing,, pages 580-585, 2008.
-
(2008)
Networking and Communications, 2008. WIMOB '08. IEEE International Conference on Wireless and Mobile Computing
, pp. 580-585
-
-
De Meulenaer, G.1
Gosset, F.2
Standaert, O.-X.3
Pereira, O.4
-
12
-
-
84877614231
-
Practical provably secure key sharing for near field communication devices
-
A. Elbagoury, A. Mohsen, M. Ramadan, and M. Youssef. Practical provably secure key sharing for near field communication devices. In Computing, Networking and Communications (ICNC), 2013 International Conference on, pages 750-755, 2013.
-
(2013)
Computing, Networking and Communications (ICNC 2013 International Conference on
, pp. 750-755
-
-
Elbagoury, A.1
Mohsen, A.2
Ramadan, M.3
Youssef, M.4
-
15
-
-
84878520685
-
Elliptic curve discrete logarithm problem over small degree extension fields
-
Springer-Verlag
-
A. Joux and V. Vitse. Elliptic curve discrete logarithm problem over small degree extension fields. In Journal of Cryptology, volume 26, pages 119-143. Springer-Verlag, 2013.
-
(2013)
Journal of Cryptology
, vol.26
, pp. 119-143
-
-
Joux, A.1
Vitse, V.2
-
16
-
-
0017996760
-
Time clocks, and the ordering of events in a distributed system
-
New York, NY, USA, July ACM
-
L. Lamport. Time, clocks, and the ordering of events in a distributed system. In Commun. ACM, volume 21, pages 558-565, New York, NY, USA, July 1978. ACM.
-
(1978)
Commun. ACM
, vol.21
, pp. 558-565
-
-
Lamport, L.1
-
17
-
-
0003847709
-
-
Prentice Hall PTR, Upper Saddle River, NJ, USA, 2nd edition
-
T. Rappaport. Wireless Communications: Principles and Practice. Prentice Hall PTR, Upper Saddle River, NJ, USA, 2nd edition, 2001.
-
(2001)
Wireless Communications: Principles and Practice
-
-
Rappaport, T.1
|