Sciweavers

1477 search results - page 15 / 296
» Token flow control
Sort
View
IACR
2011
292views more  IACR 2011»
14 years 2 months ago
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones
—Contactless technology is widely used in security sensitive applications, including identification, payment and access-control systems. Near Field Communication (NFC) is a shor...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
90
Voted
CDC
2008
IEEE
102views Control Systems» more  CDC 2008»
15 years 9 months ago
Observability of vortex flows
Arthur J. Krener
114
Voted
RTSS
2000
IEEE
15 years 7 months ago
Modeling Complex Flows for Worst-Case Execution Time Analysis
Jakob Engblom, Andreas Ermedahl