![]() |
| 2008 | ||
|---|---|---|
| 3 | EE | Tianjie Cao, Peng Shen, Elisa Bertino: Cryptanalysis of the LCSS RFID Authentication Protocol. ISECS 2008: 305-309 |
| 2 | EE | Tianjie Cao, Peng Shen, Elisa Bertino: Cryptanalysis of Some RFID Authentication Protocols. JCM 3(7): 20-27 (2008) |
| 2002 | ||
| 1 | EE | Mark S. Gockenbach, Daniel R. Reynolds, Peng Shen, William W. Symes: Efficient and automatic implementation of the adjoint state method. ACM Trans. Math. Softw. 28(1): 22-44 (2002) |
| 1 | Elisa Bertino | [2] [3] |
| 2 | Tianjie Cao | [2] [3] |
| 3 | Mark S. Gockenbach | [1] |
| 4 | Daniel R. Reynolds | [1] |
| 5 | William W. Symes | [1] |