Mitigate Unauthorized Tracking in RFID Discovery Service Qiang Yan 1, Robert H. Deng 1, Zheng Yan 2, Yingjiu Li 1, Tieyan Li 3 1 Singapore Management University,
IS 302: Information Security and Trust Week 4: Asymmetric Encryption 2012.
On Limitations of Designing Leakage Resilient Password Systems: Attacks, Principles and Usability Presented by Siddarth Asokan 1.
IS 302: Information Security and Trust Week 2: Encryption Basics 2012.
Presented by Siddarth Asokan