Sciweavers

PERCOM   2007 IEEE International Conference on Pervasive Computing and Communications
Wall of Fame | Most Viewed PERCOM-2007 Paper
PERCOM
2007
ACM
15 years 12 hour ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source218
2Download preprint from source215
3Download preprint from source203
4Download preprint from source192
5Download preprint from source191
6Download preprint from source190
7Download preprint from source190
8Download preprint from source189
9Download preprint from source188
10Download preprint from source187
11Download preprint from source184
12Download preprint from source181
13Download preprint from source178
14Download preprint from source178
15Download preprint from source176
16Download preprint from source176
17Download preprint from source176
18Download preprint from source175
19Download preprint from source174
20Download preprint from source171
21Download preprint from source171
22Download preprint from source170
23Download preprint from source170
24Download preprint from source170
25Download preprint from source167
26Download preprint from source165
27Download preprint from source164
28Download preprint from source163
29Download preprint from source162
30Download preprint from source161
31Download preprint from source161
32Download preprint from source160
33Download preprint from source160
34Download preprint from source160
35Download preprint from source159
36Download preprint from source155
37Download preprint from source153
38Download preprint from source153
39Download preprint from source152
40Download preprint from source150
41Download preprint from source147
42Download preprint from source147
43Download preprint from source147
44Download preprint from source147
45Download preprint from source146
46Download preprint from source145
47Download preprint from source144
48Download preprint from source143
49Download preprint from source143
50Download preprint from source141
51Download preprint from source139
52Download preprint from source139
53Download preprint from source138
54Download preprint from source138
55Download preprint from source137
56Download preprint from source134
57Download preprint from source132
58Download preprint from source132
59Download preprint from source131
60Download preprint from source130
61Download preprint from source130
62Download preprint from source129
63Download preprint from source129
64Download preprint from source129
65Download preprint from source129
66Download preprint from source128
67Download preprint from source127
68Download preprint from source126
69Download preprint from source126
70Download preprint from source125
71Download preprint from source124
72Download preprint from source123
73Download preprint from source121
74Download preprint from source120
75Download preprint from source119
76Download preprint from source116
77Download preprint from source116
78Download preprint from source114
79Download preprint from source114
80Download preprint from source111
81Download preprint from source111
82Download preprint from source109
83Download preprint from source108
84Download preprint from source107
85Download preprint from source106
86Download preprint from source106
87Download preprint from source105
88Download preprint from source105
89Download preprint from source102
90Download preprint from source97
91Download preprint from source88