I agree that this site is using cookies. You can find further informations
here
.
X
Login
Merkliste (
0
)
Home
About us
Home About us
Our history
Profile
Press & public relations
Friends
The library in figures
Exhibitions
Projects
Training, internships, careers
Films
Services & Information
Home Services & Information
Lending and interlibrary loans
Returns and renewals
Training and library tours
My Account
Library cards
New to the library?
Download Information
Opening hours
Learning spaces
PC, WLAN, copy, scan and print
Catalogs and collections
Home Catalogs and Collections
Rare books and manuscripts
Digital collections
Subject Areas
Our sites
Home Our sites
Central Library
Law Library (Juridicum)
BB Business and Economics (BB11)
BB Physics and Electrical Engineering
TB Engineering and Social Sciences
TB Economics and Nautical Sciences
TB Music
TB Art & Design
TB Bremerhaven
Contact the library
Home Contact the library
Staff Directory
Open access & publishing
Home Open access & publishing
Reference management: Citavi & RefWorks
Publishing documents
Open Access in Bremen
zur Desktop-Version
Toggle navigation
Merkliste
1 Ergebnisse
1
Security of Distance-Bounding : A Survey:
Avoine, Gildas
;
Bingöl, Muhammed Ali
;
Boureanu, Ioana
...
ACM Computing Surveys (CSUR). 51 (2018) 5 - p. 1-33 , 2018
Link:
https://dl.acm.org/doi/10.1145/3264628
RT Journal T1
Security of Distance-Bounding : A Survey
UL https://suche.suub.uni-bremen.de/peid=acm-3264628&Exemplar=1&LAN=DE A1 Avoine, Gildas A1 Bingöl, Muhammed Ali A1 Boureanu, Ioana A1 čapkun, Srdjan A1 Hancke, Gerhard A1 Kardaş, Süleyman A1 Kim, Chong Hee A1 Lauradoux, Cédric A1 Martin, Benjamin A1 Munilla, Jorge A1 Peinado, Alberto A1 Rasmussen, Kasper Bonne A1 Singelée, Dave A1 Tchamkerten, Aslan A1 Trujillo-Rasua, Rolando A1 Vaudenay, Serge PB ACM YR 2018 SN 0360-0300 SN 1557-7341 K1 Information security K1 contactless K1 cryptography K1 distance fraud K1 distance-bounding K1 mafia fraud K1 proximity check K1 relay attacks K1 terrorist fraud K1 Security and privacy K1 Cryptography K1 Security services K1 Authentication K1 Security in hardware K1 Hardware security implementation K1 Hardware-based security protocols K1 Computer systems organization K1 Embedded and cyber-physical systems K1 Network security K1 Security protocols K1 Hardware K1 Integrated circuits K1 Interconnect K1 Radio frequency and wireless interconnect JF ACM Computing Surveys (CSUR) VO 51 IS 5 SP 1 OP 33 LK http://dx.doi.org/https://dl.acm.org/doi/10.1145/3264628 DO https://dl.acm.org/doi/10.1145/3264628 SF ELIB - SuUB Bremen
Export
RefWorks (nur Desktop-Version!)
Flow
(Zuerst in
Flow
einloggen, dann importieren)