RFID Authentication Protocols based on Elliptic Curves: A Top-Down Evaluation Survey

Michael Hutter

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Originalspracheenglisch
TitelInternational Conference on Security and Cryptography - SECRYPT 2009, it is part of ICETE - The International Joint Conference on e-Business and Telecommunications, Milan, Italy, July 7-10, 2009, Proceedings
Herausgeber (Verlag).
Seiten101-110
ISBN (Print)978-989-674-005-4
PublikationsstatusVeröffentlicht - 2009
VeranstaltungInternational Conference on Security and Cryptography - Milan, Italien
Dauer: 7 Jul 200910 Jul 2009

Konferenz

KonferenzInternational Conference on Security and Cryptography
LandItalien
OrtMilan
Zeitraum7/07/0910/07/09

Treatment code (Nähere Zuordnung)

  • Basic - Fundamental (Grundlagenforschung)
  • Theoretical

Dies zitieren

Hutter, M. (2009). RFID Authentication Protocols based on Elliptic Curves: A Top-Down Evaluation Survey. in International Conference on Security and Cryptography - SECRYPT 2009, it is part of ICETE - The International Joint Conference on e-Business and Telecommunications, Milan, Italy, July 7-10, 2009, Proceedings (S. 101-110). ..

RFID Authentication Protocols based on Elliptic Curves: A Top-Down Evaluation Survey. / Hutter, Michael.

International Conference on Security and Cryptography - SECRYPT 2009, it is part of ICETE - The International Joint Conference on e-Business and Telecommunications, Milan, Italy, July 7-10, 2009, Proceedings. ., 2009. S. 101-110.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Hutter, M 2009, RFID Authentication Protocols based on Elliptic Curves: A Top-Down Evaluation Survey. in International Conference on Security and Cryptography - SECRYPT 2009, it is part of ICETE - The International Joint Conference on e-Business and Telecommunications, Milan, Italy, July 7-10, 2009, Proceedings. ., S. 101-110, Milan, Italien, 7/07/09.
Hutter M. RFID Authentication Protocols based on Elliptic Curves: A Top-Down Evaluation Survey. in International Conference on Security and Cryptography - SECRYPT 2009, it is part of ICETE - The International Joint Conference on e-Business and Telecommunications, Milan, Italy, July 7-10, 2009, Proceedings. . 2009. S. 101-110
Hutter, Michael. / RFID Authentication Protocols based on Elliptic Curves: A Top-Down Evaluation Survey. International Conference on Security and Cryptography - SECRYPT 2009, it is part of ICETE - The International Joint Conference on e-Business and Telecommunications, Milan, Italy, July 7-10, 2009, Proceedings. ., 2009. S. 101-110
@inproceedings{ddf0cf0c876c4ba0afe8367e1e27011c,
title = "RFID Authentication Protocols based on Elliptic Curves: A Top-Down Evaluation Survey",
author = "Michael Hutter",
year = "2009",
language = "English",
isbn = "978-989-674-005-4",
pages = "101--110",
booktitle = "International Conference on Security and Cryptography - SECRYPT 2009, it is part of ICETE - The International Joint Conference on e-Business and Telecommunications, Milan, Italy, July 7-10, 2009, Proceedings",
publisher = ".",

}

TY - GEN

T1 - RFID Authentication Protocols based on Elliptic Curves: A Top-Down Evaluation Survey

AU - Hutter, Michael

PY - 2009

Y1 - 2009

UR - http://www.secrypt.org/

UR - http://www.secrypt.org/

M3 - Conference contribution

SN - 978-989-674-005-4

SP - 101

EP - 110

BT - International Conference on Security and Cryptography - SECRYPT 2009, it is part of ICETE - The International Joint Conference on e-Business and Telecommunications, Milan, Italy, July 7-10, 2009, Proceedings

PB - .

ER -