Sciweavers

1490 search results - page 52 / 298
» The Logic of Authentication Protocols
Sort
View
108
Voted
RFIDSEC
2010
15 years 2 months ago
Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols
Gildas Avoine, Iwen Coisel, Tania Martin
99
Voted
MOBILIGHT
2010
15 years 1 months ago
Wide-Weak Privacy-Preserving RFID Authentication Protocols
Yong Ki Lee, Lejla Batina, Dave Singelée, I...
99
Voted
CISC
2009
Springer
134views Cryptology» more  CISC 2009»
15 years 1 months ago
Weaknesses in Two Recent Lightweight RFID Authentication Protocols
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan...