2008 | ||
---|---|---|
3 | EE | Tianjie Cao, Peng Shen, Elisa Bertino: Cryptanalysis of the LCSS RFID Authentication Protocol. ISECS 2008: 305-309 |
2 | EE | Tianjie Cao, Peng Shen, Elisa Bertino: Cryptanalysis of Some RFID Authentication Protocols. JCM 3(7): 20-27 (2008) |
2002 | ||
1 | EE | Mark S. Gockenbach, Daniel R. Reynolds, Peng Shen, William W. Symes: Efficient and automatic implementation of the adjoint state method. ACM Trans. Math. Softw. 28(1): 22-44 (2002) |
1 | Elisa Bertino | [2] [3] |
2 | Tianjie Cao | [2] [3] |
3 | Mark S. Gockenbach | [1] |
4 | Daniel R. Reynolds | [1] |
5 | William W. Symes | [1] |