[Lecture Notes in Computer Science] Security in Pervasive Computing Volume 3450 || Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment
โ Scribed by Hutter, Dieter; Ullmann, Markus
- Book ID
- 120359966
- Publisher
- Springer Berlin Heidelberg
- Year
- 2005
- Weight
- 250 KB
- Category
- Article
- ISBN
- 3540320040
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
This Book Constitutes The Refereed Proceedings Of The Second International Conference On Security In Pervasive Computing, Spc 2005, Held In Boppard, Germany In April 2005. The 14 Revised Full Papers And 3 Revised Short Papers Presented Together With Abstracts Of 5 Invited Talks Were Carefully Review
This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on securit
The Second International Workshop On Trustworthiness, Reliability And Services In Ubiquitous And Sensor Networks (trust 2007) -- The First International Workshop On System And Software For Wireless Soc (wsoc 2007) -- The Third International Symposium On Network-centric Ubiquitous Systems (ncus 2007)