1 |
H. Chan, etcs, "Security and Privacy in sensor networks," IEEE Computer, V.36, N.10, pp.103-105, Oct. 2003
DOI
ScienceOn
|
2 |
S. Sarma, S. Weis, D. Engels, "RFID systems and Security and privacy implications", in: Workshop on Cryptographic Hardware and Embedded Systems(CHES) 2002, LNCS No. 2523, 2003, pp. 454-469
DOI
ScienceOn
|
3 |
S. A. Weis, etcs, "Security and privacy aspects of low cost radion frequency identification systems", security in pervasive computing, 2003. (Journal Online Sources style) K. Author. (year,
|
4 |
P. Ekdahl, and T. Johansson, "Another attack on A5/1 ", IEEE Transactions on Information Theory, V.49, N.1, pp.284-289, 2003.Y. Yorozu, M. Hirano, K. aka, and Y. Tagawa
DOI
ScienceOn
|
5 |
S. A. Weis, S. E. Sarma, R. Rivest, and D. W. Engels, "Security and privacy aspects of low-cost radio frequency identification systems," in Proc. 1st Security Pervasive Comput., 2003, vol. 2802, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, pp. 201-212
|