This book investigates tradeoff between security and usability in designing leakage resilient pas...
This book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference ...
This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInterna...
This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInterna...
This book investigates tradeoff between security and usability in designing leakage resilient pas...
This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 1...
This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 1...
As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to ...
This book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference ...