Digital Library
Search Results: [ keyword: Attack ] (108)
Tian-Zuo Wang,
Huai-Min Wang,
Bo Liu,
Bo Ding,
Jing Zhang,
Pei-Chang Shi,
Vol. 6, No. 10, October 28, 2012
10.3837/tiis.2012.10.017
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Jea Tek Ryu,
Byeong-hee Roh,
Ki Yeol Ryu,
Myungchul Yoon,
Vol. 6, No. 7, July 24, 2012
10.3837/tiis.2012.07.008
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Li Li,
Qing-Shan Jia,
Xiaohong Guan,
Hengtao Wang,
Vol. 6, No. 5, May 24, 2012
10.3837/tiis.2012.05.005
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Junghyun Nam,
Moonseong Kim,
Juryon Paik,
Dongho Won,
Vol. 6, No. 2, February 27, 2012
10.3837/tiis.2012.02.018
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Woo Yong Choi,
Yongwha Chung,
Jin-Won Park,
Dowon Hong,
Vol. 5, No. 11, November 28, 2011
10.3837/tiis.2011.11.020
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Sungju Lee,
Yongwha Chung,
Daesung Moon,
Sung Bum Pan,
Chang-Ho Seo,
Vol. 5, No. 10, October 30, 2011
10.3837/tiis.2011.10.006
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
99.
Attacks and Countermeasures for RFID Mutual Authentication Scheme in Pervasive Computing Environment
Abedelaziz Mohaisen,
Ku-Young Chang,
Dowon Hong,
Vol. 5, No. 9, September 28, 2011
10.3837/tiis.2011.09.011
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)