Summary
Whereas traditional security protocols achieve their security goals relying solely on cryptographic primitives like encryptions and hash functions, the protocols employed to secure contactless devices establish and rely in addition on properties of the physical world. For...
More information & hyperlinks
Web resources: | https://popstar.irisa.fr |