Search the dblp DataBase
Michael Hutter :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Michael Hutter Selbstorganisation in sozialen Systemen - Eine Theorie und ihre Anwendung auf Wirtschaftssysteme. [Citation Graph (0, 0)][DBLP ] Aspekte der Selbstorganisation, 1992, pp:86-97 [Conf ] Michael Hutter , Stefan Mangard , Martin Feldhofer Power and EM Attacks on Passive 13.56 MHz RFID Devices. [Citation Graph (0, 0)][DBLP ] CHES, 2007, pp:320-333 [Conf ] Attacking ECDSA-Enabled RFID Devices. [Citation Graph (, )][DBLP ] Security processor with quantum key distribution. [Citation Graph (, )][DBLP ] Side-Channel Leakage across Borders. [Citation Graph (, )][DBLP ] RFID and Its Vulnerability to Faults. [Citation Graph (, )][DBLP ] Optical Fault Attacks on AES: A Threat in Violet. [Citation Graph (, )][DBLP ] Embedded system management using WBEM. [Citation Graph (, )][DBLP ] RFID Authentication Protocols based on Elliptic Curves - A Top-Down Evaluation Survey. [Citation Graph (, )][DBLP ] On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs