150 papers found
Refreshing results…
Robustness Analysis of Real-Time Scheduling Against Differential Power Analysis Attacks
Download from citeseerx.ist.psu.eduS-box, SET, Match: A Toolbox for S-box Analysis
Download from link.springer.comSecurity analysis of industrial test compression schemes
Download from repository.ubn.ru.nlDesignated Attribute-Based Proofs for RFID Applications
Download from citeseerx.ist.psu.eduUsing NFC Phones for Proving Credentials
Download from www.researchgate.netHierarchical ECC-Based RFID Authentication Protocol
Download from lirias.kuleuven.beSecurity and Privacy of Smartcard-based e-Identity
Download from www.researchgate.netMissing publications? Read more about our data sources.