(2012): Volumes 7200–7249 - Index of files in - University of Utah
(2012): Volumes 7200–7249 - Index of files in - University of Utah
(2012): Volumes 7200–7249 - Index of files in - University of Utah
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
REFERENCES 96<br />
<strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349 (electronic).<br />
URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-3-<br />
642-32298-3_3/.<br />
Ekberg:<strong>2012</strong>:MTT<br />
[431] Jan-Erik Ekberg and Sandeep Tamrakar. Mass transit ticket<strong>in</strong>g with<br />
NFC mobile phones. Lecture Notes <strong>in</strong> Computer Science, 7222:48–65,<br />
<strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349 (electronic).<br />
URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-3-<br />
642-32298-3_4/.<br />
Derler:<strong>2012</strong>:ATN<br />
[432] David Derler, Klaus Potzmader, Johannes W<strong>in</strong>ter, and Kurt Dietrich.<br />
Anonymous ticket<strong>in</strong>g for NFC-enabled mobile phones. Lecture Notes <strong>in</strong><br />
Computer Science, 7222:66–83, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-<br />
9743 (pr<strong>in</strong>t), 1611-3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/<br />
chapter/10.1007/978-3-642-32298-3_5/.<br />
Yue:<strong>2012</strong>:SIC<br />
[433] Q<strong>in</strong>ggang Yue, Feng Liu, and Rui Xue. Some improvements to the costbased<br />
framework for analyz<strong>in</strong>g denial <strong>of</strong> service attacks. Lecture Notes<br />
<strong>in</strong> Computer Science, 7222:84–101, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-<br />
9743 (pr<strong>in</strong>t), 1611-3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/<br />
chapter/10.1007/978-3-642-32298-3_6/.<br />
Li:<strong>2012</strong>:FDM<br />
[434] Wei Li, Dawu Gu, Zhiqiang Liu, Ya Liu, and Xiaohu Huang. Fault detection<br />
<strong>of</strong> the MacGuff<strong>in</strong> Cipher aga<strong>in</strong>st differential fault attack. Lecture<br />
Notes <strong>in</strong> Computer Science, 7222:102–112, <strong>2012</strong>. CODEN LNCSD9. ISSN<br />
0302-9743 (pr<strong>in</strong>t), 1611-3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.<br />
com/chapter/10.1007/978-3-642-32298-3_7/.<br />
Zhang:<strong>2012</strong>:CSSa<br />
[435] Zijian Zhang, Liehuang Zhu, Feng Wang, Lejian Liao, Cong Guo, and<br />
Hongyuan Wang. Computationally sound symbolic analysis <strong>of</strong> EAP-<br />
TNC protocol. Lecture Notes <strong>in</strong> Computer Science, 7222:113–128,<br />
<strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349 (electronic).<br />
URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-3-<br />
642-32298-3_8/.<br />
Jamthagen:<strong>2012</strong>:TRD<br />
[436] Christopher Jämthagen, Mart<strong>in</strong> Hell, and Ben Smeets. A technique for<br />
remote detection <strong>of</strong> certa<strong>in</strong> virtual mach<strong>in</strong>e monitors. Lecture Notes <strong>in</strong>