01.08.2013 Views

(2012): Volumes 7200–7249 - Index of files in - University of Utah

(2012): Volumes 7200–7249 - Index of files in - University of Utah

(2012): Volumes 7200–7249 - Index of files in - University of Utah

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

REFERENCES 96<br />

<strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349 (electronic).<br />

URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-3-<br />

642-32298-3_3/.<br />

Ekberg:<strong>2012</strong>:MTT<br />

[431] Jan-Erik Ekberg and Sandeep Tamrakar. Mass transit ticket<strong>in</strong>g with<br />

NFC mobile phones. Lecture Notes <strong>in</strong> Computer Science, 7222:48–65,<br />

<strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349 (electronic).<br />

URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-3-<br />

642-32298-3_4/.<br />

Derler:<strong>2012</strong>:ATN<br />

[432] David Derler, Klaus Potzmader, Johannes W<strong>in</strong>ter, and Kurt Dietrich.<br />

Anonymous ticket<strong>in</strong>g for NFC-enabled mobile phones. Lecture Notes <strong>in</strong><br />

Computer Science, 7222:66–83, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-<br />

9743 (pr<strong>in</strong>t), 1611-3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/<br />

chapter/10.1007/978-3-642-32298-3_5/.<br />

Yue:<strong>2012</strong>:SIC<br />

[433] Q<strong>in</strong>ggang Yue, Feng Liu, and Rui Xue. Some improvements to the costbased<br />

framework for analyz<strong>in</strong>g denial <strong>of</strong> service attacks. Lecture Notes<br />

<strong>in</strong> Computer Science, 7222:84–101, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-<br />

9743 (pr<strong>in</strong>t), 1611-3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/<br />

chapter/10.1007/978-3-642-32298-3_6/.<br />

Li:<strong>2012</strong>:FDM<br />

[434] Wei Li, Dawu Gu, Zhiqiang Liu, Ya Liu, and Xiaohu Huang. Fault detection<br />

<strong>of</strong> the MacGuff<strong>in</strong> Cipher aga<strong>in</strong>st differential fault attack. Lecture<br />

Notes <strong>in</strong> Computer Science, 7222:102–112, <strong>2012</strong>. CODEN LNCSD9. ISSN<br />

0302-9743 (pr<strong>in</strong>t), 1611-3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.<br />

com/chapter/10.1007/978-3-642-32298-3_7/.<br />

Zhang:<strong>2012</strong>:CSSa<br />

[435] Zijian Zhang, Liehuang Zhu, Feng Wang, Lejian Liao, Cong Guo, and<br />

Hongyuan Wang. Computationally sound symbolic analysis <strong>of</strong> EAP-<br />

TNC protocol. Lecture Notes <strong>in</strong> Computer Science, 7222:113–128,<br />

<strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349 (electronic).<br />

URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-3-<br />

642-32298-3_8/.<br />

Jamthagen:<strong>2012</strong>:TRD<br />

[436] Christopher Jämthagen, Mart<strong>in</strong> Hell, and Ben Smeets. A technique for<br />

remote detection <strong>of</strong> certa<strong>in</strong> virtual mach<strong>in</strong>e monitors. Lecture Notes <strong>in</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!