-
2
-
-
26444478592
-
RFID traceability: A multilayer problem
-
Andrew Patrick and Moti Yung, editors, Financial Cryptography - FC'05, Roseau, The Commonwealth Of Dominica, February - March. IFCA, Springer-Verlag
-
Gildas Avoine and Philippe Oechslin. RFID traceability: A multilayer problem. In Andrew Patrick and Moti Yung, editors, Financial Cryptography - FC'05, volume 3570 of Lecture Notes in Computer Science, pages 125-140, Roseau, The Commonwealth Of Dominica, February - March 2005. IFCA, Springer-Verlag.
-
(2005)
Lecture Notes in Computer Science
, vol.3570
, pp. 125-140
-
-
Avoine, G.1
Oechslin, P.2
-
3
-
-
26444443915
-
A scalable and provably secure hash based RFID protocol
-
Kauai Island, Hawaii, USA, March. IEEE, IEEE Computer Society Press
-
Gildas Avoine and Philippe Oechslin. A scalable and provably secure hash based RFID protocol. In International Workshop on Pervasive Computing and Communication Security - PerSec 2005, pages 110-114, Kauai Island, Hawaii, USA, March 2005. IEEE, IEEE Computer Society Press.
-
(2005)
International Workshop on Pervasive Computing and Communication Security - PerSec 2005
, pp. 110-114
-
-
Avoine, G.1
Oechslin, P.2
-
4
-
-
84877887414
-
Security analysis of a cryptographically-enabled RFID device
-
Baltimore, Maryland, USA, July-August. USENIX
-
Steve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Avi Rubin, and Michael Szydlo. Security analysis of a cryptographically-enabled RFID device. In 14th USENIX Security Symposium, pages 1-16, Baltimore, Maryland, USA, July-August 2005. USENIX.
-
(2005)
14th USENIX Security Symposium
, pp. 1-16
-
-
Bono, S.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.5
Szydlo, M.6
-
5
-
-
33745631797
-
International news letter of the TI RFID group
-
Susy d'Hont (Editor), November
-
Susy d'Hont (Editor). International news letter of the TI RFID group. Electronic Newsletter, Issue 20, November 2000.
-
(2000)
Electronic Newsletter
, Issue.20
-
-
-
6
-
-
33745588303
-
-
Electronic Product Code Global Inc. http://www.epcglobalinc.org.
-
-
-
-
7
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
Marc Joye and Jean-Jacques Quisquater, editors, Workshop on Cryptographic Hardware and Embedded Systems - CHES 2004, Boston, Massachusetts, USA, August. IACR, Springer-Verlag
-
Martin Feldhofer, Sandra Dominikus, and Johannes Wolkerstorfer. Strong authentication for RFID systems using the AES algorithm. In Marc Joye and Jean-Jacques Quisquater, editors, Workshop on Cryptographic Hardware and Embedded Systems - CHES 2004, volume 3156 of Lecture Notes in Computer Science, pages 357-370, Boston, Massachusetts, USA, August 2004. IACR, Springer-Verlag.
-
(2004)
Lecture Notes in Computer Science
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
8
-
-
0004239952
-
-
Wiley, England, second edition
-
Klaus Finkenzeller. RFID Handbook. Wiley, England, second edition, 2003.
-
(2003)
RFID Handbook
-
-
Finkenzeller, K.1
-
9
-
-
35048899238
-
Universal reencryption for mixnets
-
Tatsuaki Okamoto, editor, The Cryptographers' Track at the RSA Conference - CT-RSA, San Francisco, California, USA, February. Springer-Verlag
-
Philippe Golle, Markus Jakobsson, Ari Juels, and Paul Syverson. Universal reencryption for mixnets. In Tatsuaki Okamoto, editor, The Cryptographers' Track at the RSA Conference - CT-RSA, volume 2964 of Lecture Notes in Computer Science, pages 163-178, San Francisco, California, USA, February 2004. Springer-Verlag.
-
(2004)
Lecture Notes in Computer Science
, vol.2964
, pp. 163-178
-
-
Golle, P.1
Jakobsson, M.2
Juels, A.3
Syverson, P.4
-
10
-
-
0019038335
-
A cryptanalytic time-memory trade off
-
July
-
Martin Hellman. A cryptanalytic time-memory trade off. IEEE Transactions on Information Theory, IT-26(4):401-406, July 1980.
-
(1980)
IEEE Transactions on Information Theory
, vol.IT-26
, Issue.4
, pp. 401-406
-
-
Hellman, M.1
-
11
-
-
35048847641
-
Tackling security and privacy issues in radio frequency identification devices
-
Alois Ferscha and Friedemann Mattern, editors, Pervasive Computing, Vienna, Austria, April. Springer-Verlag
-
Dirk Henrici and Paul Müller. Tackling security and privacy issues in radio frequency identification devices. In Alois Ferscha and Friedemann Mattern, editors, Pervasive Computing, volume 3001 of Lecture Notes in Computer Science, pages 219-224, Vienna, Austria, April 2004. Springer-Verlag.
-
(2004)
Lecture Notes in Computer Science
, vol.3001
, pp. 219-224
-
-
Henrici, D.1
Müller, P.2
-
12
-
-
33745611423
-
-
International Organization for Standardization, http://www.iso.org.
-
-
-
-
13
-
-
23944476196
-
Minimalist cryptography for low-cost RFID tags
-
Carlo Blundo and Stelvio Cimato, editors, The Fourth International Conference on Security in Communication Networks - SCN 2004, Amalfi, Italia, September. Springer-Verlag
-
Ari Juels. Minimalist cryptography for low-cost RFID tags. In Carlo Blundo and Stelvio Cimato, editors, The Fourth International Conference on Security in Communication Networks - SCN 2004, volume 3352 of Lecture Notes in Computer Science, pages 149-164, Amalfi, Italia, September 2004. Springer-Verlag.
-
(2004)
Lecture Notes in Computer Science
, vol.3352
, pp. 149-164
-
-
Juels, A.1
-
14
-
-
35248832722
-
Squealing euros: Privacy protection in RFID-enabled banknotes
-
Rebecca Wright, editor, Financial Cryptography - FC'03, Le Gosier, Guadeloupe, French West Indies, January. IFCA, Springer-Verlag
-
Ari Juels and Ravikanth Pappu. Squealing euros: Privacy protection in RFID-enabled banknotes. In Rebecca Wright, editor, Financial Cryptography - FC'03, volume 2742 of Lecture Notes in Computer Science, pages 103-121, Le Gosier, Guadeloupe, French West Indies, January 2003. IFCA, Springer-Verlag.
-
(2003)
Lecture Notes in Computer Science
, vol.2742
, pp. 103-121
-
-
Juels, A.1
Pappu, R.2
-
15
-
-
18744409344
-
The blocker tag: Selective blocking of RFID tags for consumer privacy
-
Vijay Atluri, editor, Washington, DC, USA, October. ACM, ACM Press
-
Ari Juels, Ronald Rivest, and Michael Szydlo. The blocker tag: Selective blocking of RFID tags for consumer privacy. In Vijay Atluri, editor, Conference on Computer and Communications Security - CCS'OS, pages 103-111, Washington, DC, USA, October 2003. ACM, ACM Press.
-
(2003)
Conference on Computer and Communications Security - CCS'OS
, pp. 103-111
-
-
Juels, A.1
Rivest, R.2
Szydlo, M.3
-
16
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
Birgit Pfitzmann and Peng Liu, editors, Washington, DC, USA, October. ACM, ACM Press
-
David Molnar and David Wagner. Privacy and security in library RFID: Issues, practices, and architectures. In Birgit Pfitzmann and Peng Liu, editors, Conference on Computer and Communications Security - CCS'04, pages 210-219, Washington, DC, USA, October 2004. ACM, ACM Press.
-
(2004)
Conference on Computer and Communications Security - CCS'04
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
17
-
-
35248858454
-
Making a faster cryptanalytic time-memory trade-off
-
Dan Boneh, editor, Advances in Cryptology - CRYPTO'03, Santa Barbara, California, USA, August. IACR, Springer-Verlag
-
Philippe Oechslin. Making a faster cryptanalytic time-memory trade-off. In Dan Boneh, editor, Advances in Cryptology - CRYPTO'03, volume 2729 of Lecture Notes in Computer Science, pages 617-630, Santa Barbara, California, USA, August 2003. IACR, Springer-Verlag.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 617-630
-
-
Oechslin, P.1
-
18
-
-
24944575863
-
Cryptographie approach to "privacy-friendly" tags
-
MIT, Massachusetts, USA, November
-
Miyako Ohkubo, Koutarou Suzuki, and Shingo Kinoshita. Cryptographie approach to "privacy-friendly" tags. In RFID Privacy Workshop, MIT, Massachusetts, USA, November 2003.
-
(2003)
RFID Privacy Workshop
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
19
-
-
24644501824
-
Challenge-response based RFID authentication protocol for distributed database environment
-
Dieter Hutter and Markus Ullmann, editors, International Conference on Security in Pervasive Computing - SPC 3005, Boppard, Germany, April. Springer-Verlag
-
Keunwoo Rhee, Jin Kwak, Seungjoo Kim, and Dongho Won. Challenge-response based RFID authentication protocol for distributed database environment. In Dieter Hutter and Markus Ullmann, editors, International Conference on Security in Pervasive Computing - SPC 3005, volume 3450 of Lecture Notes in Computer Science, pages 70-84, Boppard, Germany, April 2005. Springer-Verlag.
-
(2005)
Lecture Notes in Computer Science
, vol.3450
, pp. 70-84
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
Won, D.4
-
20
-
-
33745600141
-
-
SafeTzone. http://www.saufetzone.com.
-
-
-
-
21
-
-
33745633587
-
-
Stop RFID. http://www.stoprfid.org.
-
-
-
-
23
-
-
21144438831
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Dieter Hutter, Günter Müller, Werner Stephan, and Markus Ullmann, editors, International Conference on Security in Pervasive Computing - SPC 2003, Boppard, Germany, March. Springer-Verlag
-
Stephen Weis, Sanjay Sarma, Ronald Rivest, and Daniel Engels. Security and privacy aspects of low-cost radio frequency identification systems. In Dieter Hutter, Günter Müller, Werner Stephan, and Markus Ullmann, editors, International Conference on Security in Pervasive Computing - SPC 2003, volume 2802 of Lecture Notes in Computer Science, pages 454-469, Boppard, Germany, March 2003. Springer-Verlag.
-
(2003)
Lecture Notes in Computer Science
, vol.2802
, pp. 454-469
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
|