RFID authentication efficient proactive information security within computational security (Q2429725): Difference between revisions
From MaRDI portal
Set profile property. |
ReferenceBot (talk | contribs) Changed an Item |
||
(2 intermediate revisions by 2 users not shown) | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W1980960784 / rank | |||
Normal rank | |||
Property / arXiv ID | |||
Property / arXiv ID: 0903.5177 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Collusion-secure fingerprinting for digital data / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Unique permutation hashing / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: RFID authentication efficient proactive information security within computational security / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q5491696 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4146667 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4718481 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q5702555 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4793049 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Information Security and Cryptology / rank | |||
Normal rank |
Latest revision as of 23:07, 3 July 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | RFID authentication efficient proactive information security within computational security |
scientific article |
Statements
RFID authentication efficient proactive information security within computational security (English)
0 references
1 April 2011
0 references
authentication protocol
0 references
information theoretic security
0 references
computational security
0 references
RFID tags
0 references
pseudo-random numbers
0 references
0 references