Seminar on Internet Technologies (Summer 2012): Difference between revisions

Jump to navigation Jump to search
Line 61: Line 61:
| [http://research.microsoft.com/en-us/people/weic/infocom11_relationshipclassification.pdf] [http://www.cs.purdue.edu/homes/rxiang/Publication_files/wfp1000-xiang.pdf]
| [http://research.microsoft.com/en-us/people/weic/infocom11_relationshipclassification.pdf] [http://www.cs.purdue.edu/homes/rxiang/Publication_files/wfp1000-xiang.pdf]
|-
|-
| Understanding Android Security
| Security in Near Field Communication (NFC) (assigned to Georg Jahn)
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4768655&tag=1]
|-
| Security in Near Field Communication (NFC)
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://events.iaik.tugraz.at/RFIDSec06/Program/papers/002%20-%20Security%20in%20NFC.pdf]
| [http://events.iaik.tugraz.at/RFIDSec06/Program/papers/002%20-%20Security%20in%20NFC.pdf]
55

edits

Navigation menu