<--- Back to Details
First PageDocument Content
Security token / Keychain / Authentication protocol / Applied Cryptography and Network Security / AKA / Cryptography / Cryptographic protocols / MIFARE
Date: 2012-06-13 22:48:00
Security token
Keychain
Authentication protocol
Applied Cryptography and Network Security
AKA
Cryptography
Cryptographic protocols
MIFARE

Add to Reading List

Source URL: icsd.i2r.a-star.edu.sg

Download Document from Source Website

File Size: 1,94 MB

Share Document on Facebook

Similar Documents

ACNS’08 6th International Conference on Applied Cryptography and Network Security 3~6 June 2008, N. York

DocID: 1uF7j - View Document

ACNS ’15 13th International Conference on Applied Cryptography and Network Security 2–5 June 2015, New York Columbia University

DocID: 1tRXl - View Document

Security / Computing / Cyberwarfare / Computer security / Computer network security / Cryptography / National security / Denial-of-service attack / Threat / Critical infrastructure protection / Internet / Vulnerability

An ideal Internet Early Warning System Dominique Petersen and Norbert Pohlmann Institute for Internet Security University of Applied Sciences Gelsenkirchen {petersen, pohlmann}@internet-sicherheit.de Abstract

DocID: 1rbtX - View Document

Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Computer access control / Internet Standards / Internet protocols / Transport Layer Security / OpenSSL / Authentication / Password

eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirchen

DocID: 1qh9k - View Document

Call for Papers: 3rd Applied Cryptography and Network Security Conference (ACNSJune 7-10, 2005 Columbia University, New York, NY, USA http://acns2005.cs.columbia.edu

DocID: 1lnvd - View Document