Near-field communication sensors

Z Cao, P Chen, Z Ma, S Li, X Gao, R Wu, L Pan, Y Shi - Sensors, 2019 - mdpi.com
Near-field communication is a new kind of low-cost wireless communication technology
developed in recent years, which brings great convenience to daily life activities such as …

Key agreement and authentication protocols in the Internet of Things: A survey

S Szymoniak, S Kesar - Applied Sciences, 2022 - mdpi.com
The rapid development of Internet of things (IoT) technology has made the IoT applicable in
many areas of life and has contributed to the IoT's improvement. IoT devices are equipped …

[图书][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

[图书][B] Life itself: a comprehensive inquiry into the nature, origin, and fabrication of life

R Rosen - 1991 - books.google.com
Why are living things alive? As a theoretical biologist, Robert Rosen saw this as the most
fundamental of all questions-and yet it had never been answered satisfactorily by science …

Lightweight RFID protocol for medical privacy protection in IoT

K Fan, W Jiang, H Li, Y Yang - IEEE Transactions on Industrial …, 2018 - ieeexplore.ieee.org
Traditional medical privacy data are at a serious risk of disclosure, and many related cases
have occurred over the years. For example, personal medical privacy data can be easily …

[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

[图书][B] Secure systems development with UML

J Jürjens - 2005 - books.google.com
Attacks against computer systems can cause considerable economic or physical damage.
High-quality development of security-critical systems is difficult, mainly because of the …

[图书][B] The modelling and analysis of security protocols: the CSP approach

P Ryan, SA Schneider - 2001 - books.google.com
Security protocols are one of the most critical elements in enabling the secure
communication and processing of information, ensuring its confidentiality, integrity …

A fair non-repudiation protocol

J Zhou, D Gollman - … 1996 IEEE symposium on security and …, 1996 - ieeexplore.ieee.org
A fair non-repudiation protocol should not give the sender of a message an advantage over
the receiver, or vice versa. We present a fair non-repudiation protocol that requires a trusted …

Reconciling two views of cryptography (the computational soundness of formal encryption)

M Abadi, P Rogaway - Journal of cryptology, 2002 - Springer
Two distinct, rigorous views of cryptography have developed over the years, in two mostly
separate communities. One of the views relies on a simple but effective formal approach; the …