Authenticating Pervasive Devices with Human Protocols
Top Cited Papers
- 1 January 2005
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 293-308
- https://doi.org/10.1007/11535218_18
Abstract
No abstract availableKeywords
This publication has 24 references indexed in Scilit:
- Minimalist Cryptography for Low-Cost RFID Tags (Extended Abstract)Lecture Notes in Computer Science, 2005
- Issues with RFID Usage in Ubiquitous Computing ApplicationsLecture Notes in Computer Science, 2004
- Noise-tolerant learning, the parity problem, and the statistical query modelJournal of the ACM, 2003
- Squealing Euros: Privacy Protection in RFID-Enabled BanknotesLecture Notes in Computer Science, 2003
- Efficient noise-tolerant learning from statistical queriesJournal of the ACM, 1998
- Low cost attacks on tamper resistant devicesLecture Notes in Computer Science, 1998
- Visual authentication and identificationLecture Notes in Computer Science, 1997
- A new paradigm for public key identificationIEEE Transactions on Information Theory, 1996
- On the inherent intractability of certain coding problems (Corresp.)IEEE Transactions on Information Theory, 1978