RFID Authentication Protocols based on Elliptic Curves: A Top-Down Evaluation Survey

Michael Hutter

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Original languageEnglish
Title of host publicationInternational Conference on Security and Cryptography - SECRYPT 2009, it is part of ICETE - The International Joint Conference on e-Business and Telecommunications, Milan, Italy, July 7-10, 2009, Proceedings
Publisher.
Pages101-110
ISBN (Print)978-989-674-005-4
Publication statusPublished - 2009
EventInternational Conference on Security and Cryptography - Milan, Italy
Duration: 7 Jul 200910 Jul 2009

Conference

ConferenceInternational Conference on Security and Cryptography
CountryItaly
CityMilan
Period7/07/0910/07/09

Treatment code (Nähere Zuordnung)

  • Basic - Fundamental (Grundlagenforschung)
  • Theoretical

Cite this