History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 76 total

Authentication based on a changeable biometric using gesture recognition with the Kinect™. (English)
ICB, 38-45(2015)
WorldCat.org
1
CAN bus risk analysis revisit. (English)
Naccache, David (ed.) et al., Information security theory and practice. Securing the internet of things. 8th IFIP WG 11.2 international workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 ‒ July 2, 2014. Proceedings. Berlin: Springer (ISBN 978-3-662-43825-1/pbk). Lecture Notes in Computer Science 8501, 170-179 (2014).
WorldCat.org
2
Precise instruction-level side channel profiling of embedded processors. (English)
Huang, Xinyi (ed.) et al., Information security practice and experience. 10th international conference, ISPEC 2014, Fuzhou, China, May 5‒8, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06319-5/pbk). Lecture Notes in Computer Science 8434, 129-143 (2014).
WorldCat.org
3
Trusted Platform Module for Smart Cards. (English)
NTMS, 1-5(2014)
WorldCat.org
4
Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR. (English)
TrustCom, 422-431(2014)
WorldCat.org
5
Remote E-Voting Using the Smart Card Web Server. (English)
IJSSEIJSSE 5, N0. 1, 39-60(2014)
WorldCat.org
6
Secure Improved Cloud-Based RFID Authentication Protocol. (English)
DPM/SETOP/QASA, 147-164(2014)
WorldCat.org
7
Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains. (English)
AINA Workshops, 871-878(2014)
WorldCat.org
8
Verifying Software Integrity in Embedded Systems: A Side Channel Approach. (English)
COSADE, 261-280(2014)
WorldCat.org
9
Ownership Management in the Context of the Internet of Things. (English)
CyberC, 150-153(2014)
WorldCat.org
10
Practical Attacks on Virtual Worlds. (English)
CRiSIS, 180-195(2014)
WorldCat.org
11
Remote attestation mechanism for user centric smart cards using pseudorandom number generators. (English)
Qing, Sihan (ed.) et al., Information and communications security. 15th international conference, ICICS 2013, Beijing, China, November 20‒22, 2013. Proceedings. Berlin: Springer (ISBN 978-3-319-02725-8/pbk). Lecture Notes in Computer Science 8233, 151-166 (2013).
WorldCat.org
12
Using the smart card web server in secure branchless banking. (English)
Lopez, Javier (ed.) et al., Network and system security. 7th international conference, NSS 2013, Madrid, Spain, June 3‒4, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38630-5/pbk). Lecture Notes in Computer Science 7873, 250-263 (2013).
WorldCat.org
13
Computer security ‒ ESORICS 2013. 18th European symposium on research in computer security, Egham, UK, September 9‒13, 2013. Proceedings. (English)
Lecture Notes in Computer Science 8134. Berlin: Springer (ISBN 978-3-642-40202-9/pbk). xviii, 794~p. EUR~101.65 (2013).
WorldCat.org
14
Recovering from a Lost Digital Wallet. (English)
HPCC/EUC, 1615-1621(2013)
WorldCat.org
15
A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model. (English)
TrustCom/ISPA/IUCC, 336-345(2013)
WorldCat.org
16
Subscriber Centric Conditional Access System for Pay-TV Systems. (English)
ICEBE, 450-455(2013)
WorldCat.org
17
Card-Present Transactions on the Internet Using the Smart Card Web Server. (English)
TrustCom/ISPA/IUCC, 611-619(2013)
WorldCat.org
18
The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems. (English)
SecureComm, 288-304(2013)
WorldCat.org
19
Vulnerability Analysis of a Commercial .NET Smart Card. (English)
CARDIS, 125-139(2013)
WorldCat.org
20
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 76 total

Valid XHTML 1.0 Transitional Valid CSS!