<--- Back to Details
First PageDocument Content
Radio-frequency identification / IP / Error detection and correction / Security parameter / Technology / Applied mathematics / Telecommunications engineering / Cryptography / Advantage / Digital signature transponder
Date: 2009-07-03 13:34:38
Radio-frequency identification
IP
Error detection and correction
Security parameter
Technology
Applied mathematics
Telecommunications engineering
Cryptography
Advantage
Digital signature transponder

RFID distance bounding protocol with mixed challenges to prevent relay attacks Chong Hee Kim and Gildas Avoine

Add to Reading List

Source URL: sites.uclouvain.be

Download Document from Source Website

File Size: 177,76 KB

Share Document on Facebook

Similar Documents

How to Calculate P(O) Calculating P(O) Forward Algorithm Backward Algorithm

How to Calculate P(O) Calculating P(O) Forward Algorithm Backward Algorithm

DocID: 1rsaS - View Document

Daniels_meeting_cover.eps

Daniels_meeting_cover.eps

DocID: 1rphC - View Document

1  Underdesigned and Opportunistic Computing in Presence of Hardware Variability Puneet Gupta1 , Member, IEEE, Yuvraj Agarwal2 , Member, IEEE, Lara Dolecek1 , Member, IEEE, Nikil Dutt6 , Fellow, IEEE, Rajesh K. Gupta2 ,

1 Underdesigned and Opportunistic Computing in Presence of Hardware Variability Puneet Gupta1 , Member, IEEE, Yuvraj Agarwal2 , Member, IEEE, Lara Dolecek1 , Member, IEEE, Nikil Dutt6 , Fellow, IEEE, Rajesh K. Gupta2 ,

DocID: 1roDZ - View Document

PROBABILISTIC ALGORITHM FOR LIST VITERBI DECODING by Janani Kalyanam

PROBABILISTIC ALGORITHM FOR LIST VITERBI DECODING by Janani Kalyanam

DocID: 1rlYO - View Document