RFID Handbook 2008
DOI: 10.1201/9781420055009.ch32
|View full text |Cite
|
Sign up to set email alerts
|

Low Overhead RFID Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2009
2009
2009
2009

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…It is of interest to discuss the structure of trancendentalities appearing in eqs. (11)(12)(13)(14)(15)(16)(17). On general grounds one could expect that the variety of ζ-constants entering into MS-renormalized (euclidian) massless propagators 4 should depend on the loop order according to Table 1.…”
Section: Final Results For R(s)mentioning
confidence: 99%
See 2 more Smart Citations
“…It is of interest to discuss the structure of trancendentalities appearing in eqs. (11)(12)(13)(14)(15)(16)(17). On general grounds one could expect that the variety of ζ-constants entering into MS-renormalized (euclidian) massless propagators 4 should depend on the loop order according to Table 1.…”
Section: Final Results For R(s)mentioning
confidence: 99%
“…Note that at eqs. (11)(12)(13)(15)(16) and (18)(19)(20)(22)(23)(24) as well as L-dependent pieces of of eqs. (21,25) are, in fact, known since long [6,7,22,15].…”
Section: Five Loop Anomalous Dimensionmentioning
confidence: 99%
See 1 more Smart Citation