|
Conferences in DBLP
(wistp) 2009 (conf/wistp/2009)
On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]
A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems. [Citation Graph (, )][DBLP]
Privacy-Aware Location Database Service for Granular Queries. [Citation Graph (, )][DBLP]
Algebraic Attacks on RFID Protocols. [Citation Graph (, )][DBLP]
Anti-counterfeiting Using Memory Spots. [Citation Graph (, )][DBLP]
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations. [Citation Graph (, )][DBLP]
Measurement Analysis When Benchmarking Java Card Platforms. [Citation Graph (, )][DBLP]
Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card. [Citation Graph (, )][DBLP]
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks. [Citation Graph (, )][DBLP]
Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure. [Citation Graph (, )][DBLP]
PKIX Certificate Status in Hybrid MANETs. [Citation Graph (, )][DBLP]
|