|
|
|
V. Belsky,E. Griboedova,K. Tsaregorodtsev,A. Chichaeva
Pág. 1 - 20
Radio-frequency tags (RFID tags) are widely used throughout the world to identify and authenticate objects. Due to the architectural features and in order to minimize implementation cost RFID tags are often subject to considerable restrictions (memory re...
ver más
|
|
|
|
|
|
|
V. Belsky,A. Drynkin,S. Davydov
Pág. 32 - 54
The issues of subscriber?s privacy in mobile phone systems are currently very interesting due to the expected growth of new communication services (virtual reality, MachineType Communications ? MTC, VehicletoEverything ? V2X, Internet of ThingsIoT, e...
ver más
|
|
|
|
|
|
|
V. Belsky,I. Gerasimov,K. Tsaregorodtsev,I. Chizhov
Pág. 1 - 23
?Personal data exchange and disclosure prevention are widespread problems in our digital world. There are a couple of information technologies embedded in the commercial and government processes. People need to exchange their personal information while u...
ver más
|
|
|
|
|
|
|
Vladimir Belsky,Ivan Chizhov,Anastasiya Chichaeva,Vasily Shishkin
Pág. 10 - 26
A physically unclonable function is a hardware device whose instances have several unique parameters and characteristics, i.e. it is impossible to create two instances with identical values of these characteristics due to the properties of the physical p...
ver más
|
|
|
|