Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
Code-based cryptography is often viewed as an interesting “Post-Quantum” alternative to the classical number theory cryptography. Unlike many other such alternatives, it has th...
Abstract—In this paper, we explore the feasibility of vehicleto-vehicle (V2V) secure communication using public key cryptography. We implement a prototype and test it extensively...
Juhong Min, Jihun Ha, Sangki Yun, Inhye Kang, Hyog...