Sciweavers

1490 search results - page 52 / 298
» The Logic of Authentication Protocols
Sort
View
91
Voted
TISSEC
2002
52views more  TISSEC 2002»
15 years 3 months ago
A methodology for analyzing the performance of authentication protocols
Alan Harbitter, Daniel A. Menascé
107
Voted
RFIDSEC
2010
15 years 1 months ago
Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols
Gildas Avoine, Iwen Coisel, Tania Martin
97
Voted
MOBILIGHT
2010
15 years 1 months ago
Wide-Weak Privacy-Preserving RFID Authentication Protocols
Yong Ki Lee, Lejla Batina, Dave Singelée, I...
98
Voted
CISC
2009
Springer
134views Cryptology» more  CISC 2009»
15 years 1 months ago
Weaknesses in Two Recent Lightweight RFID Authentication Protocols
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan...