搜索历史记录选项已关闭,请开启搜索历史记录选项。
作者: David Molnar , David Wagner
DOI: 10.1145/1030083.1030112
关键词:
摘要: … ; and poor key management practices threaten tag security. This analysis shows that today’s practices and standards fail to protect patron privacy, and vulnerabilities are present at all …
Computational Science and Its Applications - ICCSA 2006,2006, 引用: 13
international conference on web information systems and technologies,2008, 引用: 0
Information Security and Cryptography,2010, 引用: 49
usenix security symposium,2010, 引用: 561
international conference information processing,2011, 引用: 1
,2008, 引用: 2
,2008, 引用: 7
,2010, 引用: 1
Advances in Intelligent Systems and Applications - Volume 2,2013, 引用: 1
International Journal of Network Security,2008, 引用: 18