Chrisnata Johan et al. On the number of distinct k-decks: Enumeration and bounds. (2023) ADVANCES IN MATHEMATICS OF COMMUNICATIONS 1930-5346 1930-5338 17 4 960-978
Chrisnata Johan et al. On the Number of Distinct k-Decks: Enumeration and Bounds. (2019) Megjelent: 2019 19th International Symposium on Communications and Information Technologies (ISCIT) pp. 519-524
Erdős Péter et al. Subwords in reverse-complement order. (2006) ANNALS OF COMBINATORICS 0218-0006 0219-3094 10 4 415-430,
168964
Szakcikk (Folyóiratcikk) | Tudományos[168964]
Fleischmann Pamela et al. Reconstructing Words from Right-Bounded-Block Words. (2021) INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE 0129-0541 1793-6373 32 6 619-640
Zhukova G.N. et al. On the Number of Subword Reconstructions in the Binary Alphabet when Superimposed on one Character. (2020) SOVREMENNYE INFORMATSIONNYE TEKHNOLOGII I IT - OBRAZOVANIE / MODERN INFORMATION TECHNOLOGIES AND IT-EDUCATION 2411-1473 16 2 304-313
Zhukova Galina et al. About the possibility of determining the prefix and suffix of a word by subwords of fixed length. (2020) Business Informatics 2587-814X 2587-8158 14 2 84-92
de Guzman M.S. et al. Schutzenberger’s Guessing Game on a Finite Kolakoski Subsequence. (2008) Megjelent: Proceedings of the 8th Philippine Computing Science Congress ISSN 1908-1146 pp. 177-182
Erdős PL et al. Subwords in reverse-complement order. (2006) Megjelent: Combinatorial and Algorithmic Foundations of Pattern and Association Discovery,
168963
Zhukova G.N. et al. On the Number of Subword Reconstructions in the Binary Alphabet when Superimposed on one Character. (2020) SOVREMENNYE INFORMATSIONNYE TEKHNOLOGII I IT - OBRAZOVANIE / MODERN INFORMATION TECHNOLOGIES AND IT-EDUCATION 2411-1473 16 2 304-313
Miklós I et al. Efficient sampling of transpositions and inverted transpositions for Bayesian MCMC. (2006) LECTURE NOTES IN COMPUTER SCIENCE 0302-9743 1611-3349 4175 174-185,
2147309
Szakcikk (Folyóiratcikk) | Tudományos[2147309]
Yao Hua-Ting et al. Infrared: a declarative tree decomposition-powered framework for bioinformatics. (2024) ALGORITHMS FOR MOLECULAR BIOLOGY 1748-7188 1748-7188 19 1
Bárász M et al. Breaking EMAP. (2007) Megjelent: Proceedings of the Third International Conference on Security and Privacy in Communication Networks pp. 514-517,
169152
Ksiazak Piotr et al. A Lightweight Authentication and Encryption Protocol for Secure Communications Between Resource-Limited Devices Without Hardware Modification. (2021) Megjelent: Research Anthology on Artificial Intelligence Applications in Security pp. 586-630
Eyad Taqieddin. On the Improper Use of CRC for Cryptographic Purposes in RFID Mutual Authentication Protocols. (2017) INTERNATIONAL JOURNAL OF COMPUTER NETWORK AND INFORMATION SECURITY (IJCNIS) 2074-9090 2074-9104 9 2 230-240
Yousof Farzaneh et al. Vulnerability Analysis of Two Ultra lightweight RFID Authentication Protocols. (2015) INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY 1683-3198 1683-3198 12 4 340-345
Tounsia W et al. KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems. (2014) JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 1084-8045 1095-8592 39 152-166
Bezzateev S et al. RFID advanced ultra lightweight authentication protocol. (2012) Megjelent: 2012 13th International Symposium on Problems of Redundancy in Information and Control Systems, RED 2012 pp. 7-9
L Kulseng et al. Lightweight Mutual Authentication and Ownership Transfer for RFID Systems. (2010) Megjelent: IEEE INFOCOM 2010. 29th conference on computer communications. Proceedings pp. 1-5
Ksiazak Piotr et al. A Lightweight Authentication and Encryption Protocol for Secure Communications Between Resource-Limited Devices Without Hardware Modification. (2021) Megjelent: Research Anthology on Artificial Intelligence Applications in Security pp. 586-630
Abu Dhailah Hala et al. An Enhanced and Resource-Aware RFID Multitag Grouping Protocol. (2019) SECURITY AND COMMUNICATION NETWORKS 1939-0114 1939-0122 2019 1-15
Eyad Taqieddin. On the Improper Use of CRC for Cryptographic Purposes in RFID Mutual Authentication Protocols. (2017) INTERNATIONAL JOURNAL OF COMPUTER NETWORK AND INFORMATION SECURITY (IJCNIS) 2074-9090 2074-9104 9 2 230-240
Umar Mujahid et al. Efficient Hardware Implementation of Ultralightweight RFID Mutual Authentication Protocol. (2016) JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS 0218-1266 1793-6454 25
Naser Muaway et al. SURV: Shelled Ultralightweight Randomized Value Authentication Protocol for Low-Cost RFID Tags. (2015) INTERNATIONAL JOURNAL OF COMPUTER AND ELECTRICAL ENGINEERING 1793-8163 7 3 206-214
MEHMET HİLAL ÖZCANHAN et al. Mersenne twister-based RFID authentication protocol. (2015) TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES 1300-0632 1303-6203 23 231-254
Y Farzaneh et al. Vulnerability Analysis of Two Ultralightweight RFID Authentication Protocols. (2014) INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY 1683-3198 1683-3198 12 4 1-7
Piramuthu Selwyn. Passive Enumeration of Secret Information in LMAP and M 2 AP RFID Authentication Protocols. (2014) Journal of Information Privacy and Security 1553-6548 2333-696X 8 3 4-14
Tounsia W et al. KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems. (2014) JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 1084-8045 1095-8592 39 152-166
X Zhuang et al. A New Ultralightweight RFID Protocol for Low-Cost Tags: R2AP. (2014) WIRELESS PERSONAL COMMUNICATIONS 0929-6212 1572-834X 79 3 1787-1802
Ksiazak P et al. A Lightweight Authentication Protocol for Secure Communications between Resource-Limited Devices and Wireless Sensor Networks. (2014) INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY 1930-1650 1930-1669 8 4 62-102
Barrero D F et al. A genetic tango attack against the David–Prasad RFID ultra-lightweight authentication protocol. (2014) EXPERT SYSTEMS 0266-4720 1468-0394 31 1 9-19
Avoine Gildas et al. Yet Another Ultralightweight Authentication Protocol That Is Broken. (2013) Megjelent: Radio Frequency Identification. Security and Privacy Issues pp. 20-30
Z Bilal et al. Ultra-lightweight Mutual Authentication Protocols: Weaknesses and Countermeasures. (2013) Megjelent: Proceedings of 2013 Eighth International Conference on Availability, Reliability and Security (ARES) pp. 304-309
Wissam Razouk et al. A one round-trip ultralightweight security protocol for low-cost RFID tags. (2013) Journal of Green Engineering 1904-4720 2245-4586 3 3 261-272
Eyad Taqieddin et al. Vulnerability analysis of two ultra-lightweight RFID authentication protocols: RAPP and gossamer. (2012) Megjelent: 7th International Conference for Internet Technology and Secured Transactions, ICITST 2012 pp. 80-86
Yen Yi-Chung et al. Two RFID-Based Solutions for Secure Inpatient Medication Administration. (2012) JOURNAL OF MEDICAL SYSTEMS 0148-5598 1573-689X Accepted: 20 June 2011 1-10
Bezzateev S et al. RFID advanced ultra lightweight authentication protocol. (2012) Megjelent: 2012 13th International Symposium on Problems of Redundancy in Information and Control Systems, RED 2012 pp. 7-9
Wu Shuhua et al. A Secure Lightweight RFID Binding Proof Protocol for Medication Errors and Patient Safety. (2012) JOURNAL OF MEDICAL SYSTEMS 0148-5598 1573-689X Accepted: 9 June 2011 1-7
M Kianersi et al. Security Flows and Improvment of a Recent Ultra Light-weight RFID Protocol. (2011) INTERNATIONAL JOURNAL OF UBICOMP 0976-2213 0975-8992 2 4
M Kianersi et al. Security Analysis of Ultra-lightweight Protocol for Low-Cost RFID Tags: SSL-MAP. (2011) Megjelent: Recent Trends in Wireless and Mobile Networks: Third International Conferences, WiMo 2011 and CoNeCo 2011 pp. 236-245
Ãzcan A et al. Recent Trends in Wireless and Mobile Networks: Third International Conferences, Wimo 2011 and Coneco 2011, Ankara, Turkey, June 26-28, 2011. Proceedings. (2011) COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE 1865-0929 1865-0937 162
Peris-Lopez Pedro et al. Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol. (2011) Megjelent: Information Security and Cryptology pp. 427-442
G Avoine et al. Privacy-friendly synchronized ultralightweight authentication protocols in the storm. (2011) JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 1084-8045 1095-8592 35 2 826-843
E Rekleitis et al. How to protect security and privacy in the IoT: a policy-based RFID tag management protocol. (2011) SECURITY AND COMMUNICATION NETWORKS 1939-0114 1939-0122
E Rekleitis et al. How to protect security and privacy in the IoT: a policy-based RFID tag management protocol. (2011) SECURITY AND COMMUNICATION NETWORKS 1939-0114 1939-0122
M Kianersi et al. A Secure Ultra Light-Weight Mutual Authentication Protocol for Low-cost RFID Tags. (2011) INTERNATIONAL JOURNAL OF UBICOMP 0976-2213 0975-8992 2 2 17-24
Pateriya R.K. et al. An Ultralightweight Mutual Authentication Protocol for Low Cost RFID Tags. (2011) INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS 0975-8887 25 10 28-35
G Avoine et al. Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly. (2010) Radio Frequency Identifiction: Security and Privacy Issues LNCS 6370 50-64
G Avoine et al. Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly. (2010) Radio Frequency Identifiction: Security and Privacy Issues LNCS 6370 103-122
Avoine Gildas et al. Strong Authentication and Strong Integrity (SASI) Is Not That Strong. (2010) Megjelent: Radio Frequency Identification: Security and Privacy Issues pp. 50-64
Garcia-Alfaro Joaquin et al. Security Threat Mitigation Trends in Low-Cost RFID Systems. (2010) Megjelent: Data Privacy Management and Autonomous Spontaneous Security pp. 193-207
Wang Shaohui et al. Security Analysis of Some RFID Authentication Protocols. (2010) Megjelent: 2nd International Conference on e-Business and Information System Security, EBISS2010 pp. 386-389
Gamal Ahmed Eslam et al. Lightweight Mutual Authentication Protocol for Low Cost RFID Tags. (2010) INTERNATIONAL JOURNAL OF NETWORK SECURITY & ITS APPLICATIONS 0975-2307 0974-9330 2 2 27-37
L Kulseng et al. Lightweight Mutual Authentication and Ownership Transfer for RFID Systems. (2010) Megjelent: IEEE INFOCOM 2010. 29th conference on computer communications. Proceedings pp. 1-5
Bilal Zeeshan et al. Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol. (2009) Megjelent: 2009 INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS pp. 260-267
Peris-Lopez Pedro et al. Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol. (2009) Megjelent: INFORMATION SECURITY APPLICATIONS pp. 56-68
T Li et al. The security and improvement of an ultra-lightweight RFID authentication protocol. (2008) SECURITY AND COMMUNICATION NETWORKS 1939-0114 1939-0122 1 2 135-146
Wang Jiahao et al. Privacy Guaranteed Mutual Authentication on EPCglobal Class 1 Gen 2 Scheme. (2008) Megjelent: 2008 The 9th International Conference for Young Computer Scientists pp. 1583-1588
Wang Jiahao et al. PGMAP: A Privacy Guaranteed Mutual Authentication Protocol Conforming to EPC Class 1 Gen 2 Standards. (2008) Megjelent: e-Business Engineering, 2008. ICEBE '08. IEEE International Conference on pp. 289-296
Bárász M et al. Passive attack against the M2AP mutual authentication protocol for RFID tags. (2007) Megjelent: RFID Technology. Proceedings of the First International EURASIP Workshop Vienna p. CD,
169151
Ksiazak Piotr et al. A Lightweight Authentication and Encryption Protocol for Secure Communications Between Resource-Limited Devices Without Hardware Modification. (2021) Megjelent: Research Anthology on Artificial Intelligence Applications in Security pp. 586-630
Khalid Madiha et al. Probabilistic Full Disclosure Attack on IoT Network Authentication Protocol. (2020) Megjelent: Advances in Information and Communication pp. 728-738
Liu Y et al. Double verification protocol via secret sharing for low-cost RFID tags. (2019) FUTURE GENERATION COMPUTER SYSTEMS 0167-739X 1872-7115 90 118-128
Khalid Madiha et al. Cryptanalysis of Radio Frequency Identification System Mutual Authentication Protocol. (2019) Megjelent: 2019 2nd International Conference on Communication, Computing and Digital systems (C-CODE) pp. 258-263
Ksiazak Piotr et al. A Lightweight Authentication and Encryption Protocol for Secure Communications Between Resource-Limited Devices Without Hardware Modification. (2018) Megjelent: Security and Privacy Management, Techniques, and Protocols pp. 1-46
Eyad Taqieddin. On the Improper Use of CRC for Cryptographic Purposes in RFID Mutual Authentication Protocols. (2017) INTERNATIONAL JOURNAL OF COMPUTER NETWORK AND INFORMATION SECURITY (IJCNIS) 2074-9090 2074-9104 9 2 230-240
Umar Mujahid et al. Efficient Hardware Implementation of Ultralightweight RFID Mutual Authentication Protocol. (2016) JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS 0218-1266 1793-6454 25
B Mustapha et al. An ultralightweight RFID authentication protocol based on Feistel cipher structure. (2016) SECURITY AND COMMUNICATION NETWORKS 1939-0114 1939-0122 9 18 6017-6033
Yousof Farzaneh et al. Vulnerability Analysis of Two Ultra lightweight RFID Authentication Protocols. (2015) INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY 1683-3198 1683-3198 12 4 340-345
Naser Muaway et al. SURV: Shelled Ultralightweight Randomized Value Authentication Protocol for Low-Cost RFID Tags. (2015) INTERNATIONAL JOURNAL OF COMPUTER AND ELECTRICAL ENGINEERING 1793-8163 7 3 206-214
MEHMET HİLAL ÖZCANHAN et al. Mersenne twister-based RFID authentication protocol. (2015) TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES 1300-0632 1303-6203 23 231-254
W Shao-hui et al. Security analysis of two lightweight RFID authentication protocols. (2014) ANNALES DES TELECOMMUNICATIONS-ANNALS OF TELECOMMUNICATIONS 0003-4347 1958-9395 69 5-6 273-282
Piramuthu Selwyn. Passive Enumeration of Secret Information in LMAP and M 2 AP RFID Authentication Protocols. (2014) Journal of Information Privacy and Security 1553-6548 2333-696X 8 3 4-14
Masoumeh Safkhania et al. On the security of RFID anti-counting security protocol (ACSP). (2014) JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS 0377-0427 1879-1778 259 B 512-521
Tounsia W et al. KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems. (2014) JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 1084-8045 1095-8592 39 152-166
M Safkhani et al. Cryptanalysis of Cho et al.'s protocol: A hash-based RFID Tag Mutual Authentication Protocol. (2014) JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS 0377-0427 1879-1778 259 B 571-577
L Gao et al. An Ultralightweight RFID Authentication Protocol with CRC and Permutation. (2014) JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 1084-8045 1095-8592 41 37-6
L Gao et al. A Low-Cost RFID Authentication Protocol Against Desynchronization with a Random Tuple. (2014) WIRELESS PERSONAL COMMUNICATIONS 0929-6212 1572-834X 79 3 1941-1958