Abstract is missing.
- Deploying OSK on Low-Resource Mobile DevicesGildas Avoine, Muhammed Ali Bingöl, Xavier Carpent, Süleyman Kardas. 3-18 [doi]
- Is NFC a Better Option Instead of EPC Gen-2 in Safe Medication of InpatientsMehmet Hilal Özcanhan, Gökhan Dalkiliç, Semih Utku. 19-33 [doi]
- Rights Management with NFC Smartphones and Electronic ID Cards: A Proof of Concept for Modern Car SharingTimo Kasper, Alexander Kühn, David Oswald, Christian T. Zenger, Christof Paar. 34-53 [doi]
- Desynchronization and Traceability Attacks on RIPTA-DA ProtocolNasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani, Somitra Kumar Sanadhya. 57-68 [doi]
- Long Distance Relay AttackLuigi Sportiello, Andrea Ciardulli. 69-85 [doi]
- On the Security of Two RFID Mutual Authentication ProtocolsSeyed Farhad Aghili, Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani, Somitra Kumar Sanadhya. 86-99 [doi]
- Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed ArchitecturesLejla Batina, Amitabh Das, Baris Ege, Elif Bilge Kavun, Nele Mentens, Christof Paar, Ingrid Verbauwhede, Tolga Yalçin. 103-112 [doi]
- An Improved Hardware Implementation of the Quark Hash FunctionShohreh Sharif Mansouri, Elena Dubrova. 113-127 [doi]
- Analyzing Side-Channel Leakage of RFID-Suitable Lightweight ECC HardwareErich Wenger, Thomas Korak, Mario Kirschbaum. 128-144 [doi]
- Energy-Architecture Tuning for ECC-Based RFID TagsDeepak Hanamant Mane, Patrick Schaumont. 147-160 [doi]
- Speed and Size-Optimized Implementations of the PRESENT Cipher for Tiny AVR DevicesKonstantinos Papagiannopoulos, Aram Verstegen. 161-175 [doi]