Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
1490
search results - page 52 / 298
»
The Logic of Authentication Protocols
Sort
relevance
views
votes
recent
update
View
thumb
title
97
Voted
SIGMOBILE
2002
43
views
more
SIGMOBILE 2002
»
An optimized authentication protocol for mobile network reconsidered
15 years 3 months ago
Download
www.cs.cityu.edu.hk
Duncan S. Wong
claim paper
Read More »
91
Voted
TISSEC
2002
52
views
more
TISSEC 2002
»
A methodology for analyzing the performance of authentication protocols
15 years 3 months ago
Download
user.informatik.uni-goettingen.de
Alan Harbitter, Daniel A. Menascé
claim paper
Read More »
107
Voted
RFIDSEC
2010
136
views
Security Privacy
»
more
RFIDSEC 2010
»
Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols
15 years 1 months ago
Download
sites.uclouvain.be
Gildas Avoine, Iwen Coisel, Tania Martin
claim paper
Read More »
97
Voted
MOBILIGHT
2010
95
views
Communications
»
more
MOBILIGHT 2010
»
Wide-Weak Privacy-Preserving RFID Authentication Protocols
15 years 1 months ago
Download
www.cosic.esat.kuleuven.be
Yong Ki Lee, Lejla Batina, Dave Singelée, I...
claim paper
Read More »
98
Voted
CISC
2009
Springer
134
views
Cryptology
»
more
CISC 2009
»
Weaknesses in Two Recent Lightweight RFID Authentication Protocols
15 years 1 months ago
Download
www.cosic.esat.kuleuven.be
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan...
claim paper
Read More »
« Prev
« First
page 52 / 298
Last »
Next »