Handbook of Applied Cryptography
Handbook of Applied Cryptography
Low Cost Attacks on Tamper Resistant Devices
Proceedings of the 5th International Workshop on Security Protocols
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
System Software for Ubiquitous Computing
IEEE Pervasive Computing
Towards Making Broadcast Encryption Practical
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
Secure Location Verification Using Radio Broadcast
IEEE Transactions on Dependable and Secure Computing
Location constraints in digital rights management
Computer Communications
Can You See Me? The Use of a Binary Visibility Metric in Distance Bounding
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
How to construct secure cryptographic location-based services
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Secure location verification using radio broadcast
OPODIS'04 Proceedings of the 8th international conference on Principles of Distributed Systems
Enforcing regional DRM for multimedia broadcasts with and without trusted computing
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
Hi-index | 0.00 |