Sciweavers

2363 search results - page 41 / 473
» How Secure is RFID
Sort
View
ACIIDS
2010
IEEE
120views Database» more  ACIIDS 2010»
15 years 5 months ago
How to Construct State Registries-Matching Undeniability with Public Security
Przemyslaw Kubiak, Miroslaw Kutylowski, Jun Shao
ATAL
2010
Springer
15 years 5 months ago
How to protect a city: strategic security placement in graph-based domains
Jason Tsai, Zhengyu Yin, Jun-young Kwak, David Kem...
INTERFACES
2006
53views more  INTERFACES 2006»
15 years 4 months ago
How Effective Is Security Screening of Airline Passengers?
Susan E. Martonosi, Arnold Barnett
INFOCOM
2010
IEEE
15 years 2 months ago
Refresh: Weak Privacy Model for RFID Systems
—Privacy-Preserving Authentication (PPA) is crucial for Radio Frequency Identifcation (RFID)-enabled applications. Without appropriate formal privacy models, it is difficult for...
Li Lu, Yunhao Liu, Xiang-Yang Li