Seminar on Internet Technologies (Summer 2012): Difference between revisions

Jump to navigation Jump to search
Line 61: Line 61:
| [http://research.microsoft.com/en-us/people/weic/infocom11_relationshipclassification.pdf] [http://www.cs.purdue.edu/homes/rxiang/Publication_files/wfp1000-xiang.pdf]
| [http://research.microsoft.com/en-us/people/weic/infocom11_relationshipclassification.pdf] [http://www.cs.purdue.edu/homes/rxiang/Publication_files/wfp1000-xiang.pdf]
|-
|-
| Security in Near Field Communication (NFC) (assigned to Georg Jahn)
| <strike>Security in Near Field Communication (NFC)</strike> (assigned to Georg Jahn)
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://events.iaik.tugraz.at/RFIDSec06/Program/papers/002%20-%20Security%20in%20NFC.pdf]
| [http://events.iaik.tugraz.at/RFIDSec06/Program/papers/002%20-%20Security%20in%20NFC.pdf]
599

edits

Navigation menu