Sciweavers

1490 search results - page 52 / 298
» The Logic of Authentication Protocols
Sort
View
MOBILIGHT
2010
13 years 6 months ago
Wide-Weak Privacy-Preserving RFID Authentication Protocols
Yong Ki Lee, Lejla Batina, Dave Singelée, I...
CISC
2009
Springer
134views Cryptology» more  CISC 2009»
13 years 6 months ago
Weaknesses in Two Recent Lightweight RFID Authentication Protocols
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan...