Sciweavers

1477 search results - page 15 / 296
» Token flow control
Sort
View
IACR
2011
292views more  IACR 2011»
14 years 3 months ago
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones
—Contactless technology is widely used in security sensitive applications, including identification, payment and access-control systems. Near Field Communication (NFC) is a shor...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
CDC
2008
IEEE
102views Control Systems» more  CDC 2008»
15 years 10 months ago
Observability of vortex flows
Arthur J. Krener
122
Voted
RTSS
2000
IEEE
15 years 8 months ago
Modeling Complex Flows for Worst-Case Execution Time Analysis
Jakob Engblom, Andreas Ermedahl