Search
Now showing items 1-10 of 15
Physical layer security for some classes of three-receiver broadcast channels
Publisher: IET
Year: 2014
Three-user interference channel with common information: a rate splitting-based achievability scheme
Publisher: IET
Year: 2014
Impossible differential cryptanalysis of Piccolo lightweight block cipher
Publisher: IEEE
Year: 2014
Security analysis of CLEFIA-128
Publisher: IEEE
Year: 2014
A jamming resilient rendezvous protocol for Cognitive Radio Ad-Hoc Networks
Publisher: IEEE
Year: 2014
Attacks and improvements on two new-found RFID authentication protocols
Publisher: IEEE
Year: 2014
Formal cryptanalysis of a CRC-based RFID authentication protocol
Publisher: IEEE
Year: 2014