From post

Wireless Authentication and Transaction-Confirmation Token.

, , , и . ICETE (Selected Papers), том 130 из Communications in Computer and Information Science, стр. 186-198. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Promoting the Acquisition of Hardware Reverse Engineering Skills., , , , и . CoRR, (2021)Listen to Your Heart: Evaluation of the Cardiologic Ecosystem., , , , , , , , , и . ARES, стр. 10:1-10:10. ACM, (2021)Intelligent Reflecting Surface-Assisted Wireless Key Generation for Low-Entropy Environments., , , , , и . PIMRC, стр. 745-751. IEEE, (2021)An Exploratory Study of Hardware Reverse Engineering - Technical and Cognitive Processes., , , , и . SOUPS @ USENIX Security Symposium, стр. 285-300. USENIX Association, (2020)SPFA: SFA on Multiple Persistent Faults., , и . FDTC, стр. 49-56. IEEE, (2020)How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations., , , , , и . SP, стр. 1656-1671. IEEE, (2022)Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems., , , и . SP, стр. 1722-1736. IEEE, (2022)CCCiCC: A Cross-Core Cache-Independent Covert Channel on AMD Family 15h CPUs., , и . CARDIS, том 11833 из Lecture Notes in Computer Science, стр. 159-175. Springer, (2019)Highway to HAL: open-sourcing the first extendable gate-level netlist reverse engineering framework., , , , , , , , и . CF, стр. 392-397. ACM, (2019)ARMORY: Fully Automated and Exhaustive Fault Simulation on ARM-M Binaries., , и . CoRR, (2021)