Back to Results
First PageMeta Content
Automatic identification and data capture / Ubiquitous computing / Privacy / Radio-frequency identification / Wireless / Computer access control / Cryptography / Molva / Authentication / Identification / Humancomputer interaction / Security


The Molva - Di Pietro scheme Problems with the identification Design flaws
Add to Reading List

Document Date: 2008-07-10 03:06:40


Open Document

File Size: 534,89 KB

Share Result on Facebook