-
2
-
-
84882271197
-
The history of RFID technology
-
20 Dec.
-
"The History of RFID Technology," RFID J., 20 Dec. 2005; www.rfidjournal.com/article/articleview/1338/1/129.
-
(2005)
RFID J.
-
-
-
3
-
-
84858546292
-
Identification friend or foe IFF systems: IFF questions & answers
-
20 Dec.
-
"Identification Friend or Foe IFF Systems: IFF Questions & Answers," Dean Boys, 20 Dec. 2005; www.dean-boys.com/extras/iff/iffqa.html.
-
(2005)
Dean Boys
-
-
-
4
-
-
84933392900
-
Communication by means of reflected power
-
Oct.
-
H. Stockman, "Communication by Means of Reflected Power," Proc. IRE, Oct. 1948, pp. 1196-1204.
-
(1948)
Proc. IRE
, pp. 1196-1204
-
-
Stockman, H.1
-
5
-
-
84858544989
-
Chapter 16: Radar and optics
-
Dept. of Ordnance and Gunnery, US Naval Academy, "Chapter 16: Radar and Optics," Naval Ordnance and Gunnery, Vol. 2, Fire Control, 1958; www.eugeneleeslover.com/USNAVY/CHAPTER-16-A.html.
-
(1958)
Naval Ordnance and Gunnery, Vol. 2, Fire Control
, vol.2
-
-
-
6
-
-
0024012004
-
The first ten years of public-key cryptography
-
W. Diffie, "The First Ten Years of Public-Key Cryptography," Proc. IEEE, vol. 76, no. 5, 1988, pp. 560-577.
-
(1988)
Proc. IEEE
, vol.76
, Issue.5
, pp. 560-577
-
-
Diffie, W.1
-
7
-
-
84858541011
-
Union calls for european ban on staff-tracking RFID
-
19 Jul.
-
A. McCue, "Union Calls for European Ban on Staff-Tracking RFID," silicon.com, 19 Jul. 2005; http://hardware.silicon.com/servers/0, 39024647,39150564,00.htm.
-
(2005)
Silicon.com
-
-
McCue, A.1
-
8
-
-
84877887414
-
Security analysis of a cryptographically-enabled RFID device
-
USENIX
-
S. Bono et al., "Security Analysis of a Cryptographically-Enabled RFID Device," Proc. 14th USENIX Security Symp., USENIX, 2005, pp. 1-15; http://spar.isi.jhu.edu/~mgreen/DSTbreak.pdf.
-
(2005)
Proc. 14th USENIX Security Symp.
, pp. 1-15
-
-
Bono, S.1
-
11
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
LNCS 3156, Springer
-
M. Feldhofer, S. Dominikus, and J.Wolker-storfer, "Strong Authentication for RFID Systems Using the AES Algorithm," Cryptographic Hardware and Embedded Systems - CHES 2004 - 6th Int'l Workshop, LNCS 3156, Springer, 2004, pp. 357-370.
-
(2004)
Cryptographic Hardware and Embedded Systems - CHES 2004 - 6th Int'l Workshop
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolker-Storfer, J.3
-
13
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
LNCS 3621, Springer
-
A. Juels and S. Weis, "Authenticating Pervasive Devices with Human Protocols," Advances in Cryptology - CRYPTO 2005 25th Ann. Int'l Cryptology Conf., LNCS 3621, Springer, 2005, pp. 293-308.
-
(2005)
Advances in Cryptology - CRYPTO 2005 25th Ann. Int'l Cryptology Conf.
, pp. 293-308
-
-
Juels, A.1
Weis, S.2
-
14
-
-
35248872610
-
RFID systems and security and privacy implications
-
LNCS 2523, Springer
-
S. Sarma, S. Weis, and D. Engels, "RFID Systems and Security and Privacy Implications," Cryptographic Hardware and Embedded Systems - CHES 2002 - 4th Int'l Workshop, LNCS 2523, Springer 2002, pp. 454-469.
-
(2002)
Cryptographic Hardware and Embedded Systems - CHES 2002 - 4th Int'l Workshop
, pp. 454-469
-
-
Sarma, S.1
Weis, S.2
Engels, D.3
-
15
-
-
18744409344
-
The blocker tag: Selective blocking of RFID tags for consumer privacy
-
ACM Press
-
A. Juels, R.L. Rivest, and M. Szydlo, "The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy," Proc. 10th ACM Conf. Computer and Comm. Security, ACM Press, 2003, pp. 103-111.
-
(2003)
Proc. 10th ACM Conf. Computer and Comm. Security
, pp. 103-111
-
-
Juels, A.1
Rivest, R.L.2
Szydlo, M.3
-
16
-
-
39349090593
-
Keep on blockin' in the free world: Personal access control for low-cost RFID tags
-
to be published in Springer, 2006
-
M.R. Rieback, B. Crispo, and A.S. Tanenbaum, "Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags," to be published in Proc. 13th Int'l Workshop Security Protocols, Springer, 2006; www.cs.vu.nl/~melanie/rfid_guardian/papers/sec_prot.05.pdf.
-
Proc. 13th Int'l Workshop Security Protocols
-
-
Rieback, M.R.1
Crispo, B.2
Tanenbaum, A.S.3
-
17
-
-
35048899238
-
Universal Re-encryption for mixnets
-
LNCS 2964, Springer
-
P. Golle et al., "Universal Re-encryption for Mixnets," Topics in Cryptology - CT-RSA 2004, LNCS 2964, Springer, 2004, pp. 163-178.
-
(2004)
Topics in Cryptology - CT-RSA 2004
, pp. 163-178
-
-
Golle, P.1
|