Presentation title
Rfid
Humanitarian emergencies: searching for Open Data - OKCon2013
ioT-SecurityECC-v1
1 The Fortuna PRNG Niels Ferguson. 2 The problem We need to make “random” choices in cryptographic protocols. Computers are deterministic. Standard “random”
Hybrid Signcryption with Outsider Security
Persistent Security for RFID
Combinatorial Optimization of Multicast Key Management
Hybrid Signcryption with Outsider Security Alexander W. Dent.
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage