-
1
-
-
33746032793
-
-
Personal communications
-
G. Danezis, 2003. Personal communications.
-
(2003)
-
-
Danezis, G.1
-
2
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
M. Joye and J.-J. Quisquater, editors, Springer-Verlag, LNCS
-
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer. Strong authentication for RFID systems using the AES algorithm. In M. Joye and J.-J. Quisquater, editors, Cryptographic Hardware and Embedded Systems (CHES), pages 357-370. Springer-Verlag, 2004. LNCS no. 3156.
-
(2004)
Cryptographic Hardware and Embedded Systems (CHES)
, Issue.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
5
-
-
2942558265
-
An RFID bill of rights
-
October
-
S. Garfinkel. An RFID Bill of Rights. Technology Review, page 35, October 2002.
-
(2002)
Technology Review
, pp. 35
-
-
Garfinkel, S.1
-
6
-
-
35048899238
-
Universal re-encryption for mixnets
-
T. Okamoto, editor, Springer-Verlag
-
P. Golle, M. Jakobsson, A. Juels, and P. Syverson. Universal re-encryption for mixnets. In T. Okamoto, editor, RSA Conference - Cryptographers' Track (CTRSA), pages 163-178. Springer-Verlag, 2004.
-
(2004)
RSA Conference - Cryptographers' Track (CTRSA)
, pp. 163-178
-
-
Golle, P.1
Jakobsson, M.2
Juels, A.3
Syverson, P.4
-
8
-
-
2942560605
-
'Yoking-proofs' for RFID tags
-
IEEE Computer Society
-
A. Juels. 'Yoking-proofs' for RFID tags. In PerCom Workshops 2004, pages 138-143. IEEE Computer Society, 2004.
-
(2004)
PerCom Workshops 2004
, pp. 138-143
-
-
Juels, A.1
-
9
-
-
20444478767
-
Soft blocking: Flexible blocker tags on the cheap
-
S. De Capitani di Vimercatiand P. Syverson, editor, ACM Press
-
A. Juels and J. Brainard. Soft blocking: Flexible blocker tags on the cheap. In S. De Capitani di Vimercatiand P. Syverson, editor, Wireless Privacy in the Electronic Society (WPES 04), pages 1-8. ACM Press, 2004.
-
(2004)
Wireless Privacy in the Electronic Society (WPES 04)
, pp. 1-8
-
-
Juels, A.1
Brainard, J.2
-
10
-
-
35248832722
-
Squealing Euros: Privacy protection in RFID-enabled banknotes
-
R. Wright, editor, Springer-Verlag, LNCS
-
A. Juels and R. Pappu. Squealing Euros: Privacy protection in RFID-enabled banknotes. In R. Wright, editor, Financial Cryptography '03, pages 103-121. Springer-Verlag, 2003. LNCS no. 2742.
-
(2003)
Financial Cryptography '03
, Issue.2742
, pp. 103-121
-
-
Juels, A.1
Pappu, R.2
-
11
-
-
18744409344
-
The blocker tag: Selective blocking of RFID tags for consumer privacy
-
V. Atluri, editor, ACM Press
-
A. Juels, R.L. Rivest, and M. Szydlo. The blocker tag: Selective blocking of RFID tags for consumer privacy. In V. Atluri, editor, 8th ACM Conference on Computer and Communications Security, pages 103-111. ACM Press, 2003.
-
(2003)
8th ACM Conference on Computer and Communications Security
, pp. 103-111
-
-
Juels, A.1
Rivest, R.L.2
Szydlo, M.3
-
12
-
-
20844453821
-
Minimalist cryptography for RFID tags
-
C. Blundo and S. Cimato, editors, Springer-Verlag
-
Ari Juels. Minimalist Cryptography for RFID Tags. In C. Blundo and S. Cimato, editors, Security in Communication Networks, pages 149-164. Springer-Verlag, 2004.
-
(2004)
Security in Communication Networks
, pp. 149-164
-
-
Juels, A.1
-
13
-
-
2942625320
-
860 MHz-960 Mhz class 1 radio frequency identification tag radio frequency and logical communication interface specification recommended standard, version 1.0.0
-
Auto-ID Labs, Referenced in 2005
-
AutoID Labs. 860 MHz-960 Mhz class 1 radio frequency identification tag radio frequency and logical communication interface specification recommended standard, version 1.0.0. Technical Report MIT-AUTOID-WH-007, Auto-ID Labs, 2002. Referenced in 2005 at http://www.autoidlabs.com.
-
(2002)
Technical Report
, vol.MIT-AUTOID-WH-007
-
-
-
14
-
-
2942532031
-
RFID tags: Big Brother in small packages
-
13 January
-
D. McCullagh. RFID tags: Big Brother in small packages. CNet, 13 January 2003. Available at http://news.com.com/2010-1069-980325.html.
-
(2003)
CNet
-
-
McCullagh, D.1
-
15
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
B. Pfitzmann and P. McDaniel, editors
-
D. Molnar and D. Wagner. Privacy and security in library RFID: Issues, practices, and architectures. In B. Pfitzmann and P. McDaniel, editors, ACM CCS, pages 210 - 219, 2004.
-
(2004)
ACM CCS
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
16
-
-
20444483102
-
Nokia unveils RFID phone reader
-
17 March
-
Nokia unveils RFID phone reader. RFID Journal, 17 March 2004. Available at http://www.rfidjournal.com/article/view/834.
-
(2004)
RFID Journal
-
-
-
17
-
-
84938811530
-
Protocols using anonymous connections: Mobile applicatons
-
Bruce Christianson, Bruno Crispo, Mark Lomas, and Michael Roe, editors, Springer-Verlag, LNCS 1361, April
-
Michael G. Reed, Paul F. Syverson, and David M. Goldschlag. Protocols using anonymous connections: Mobile applicatons. In Bruce Christianson, Bruno Crispo, Mark Lomas, and Michael Roe, editors, Security Protocols, 5th International Workshop, pages 13-23. Springer-Verlag, LNCS 1361, April 1997. Available at http://chacs.nrl.navy.mil/publications/CHACS/1997/.
-
(1997)
Security Protocols, 5th International Workshop
, pp. 13-23
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
18
-
-
2942593615
-
Radio-frequency identification systems
-
Burton S. Kaliski Jr., Cetin Kaya Koç, and Christof Paar, editors, Springer-Verlag, LNCS
-
S. E. Sarma, S. A. Weis, and D.W. Engels. Radio-frequency identification systems. In Burton S. Kaliski Jr., Cetin Kaya Koç, and Christof Paar, editors, CHES '02, pages 454-469. Springer-Verlag, 2002. LNCS no. 2523.
-
(2002)
CHES '02
, Issue.2523
, pp. 454-469
-
-
Sarma, S.E.1
Weis, S.A.2
Engels, D.W.3
-
19
-
-
13444297889
-
Towards the five-cent tag
-
MIT Auto ID Center
-
S.E. Sarma. Towards the five-cent tag. Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center, 2001. Available from http://www.epcglobalinc.org.
-
(2001)
Technical Report
, vol.MIT-AUTOID-WH-006
-
-
Sarma, S.E.1
-
20
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Springer-Verlag, LNCS
-
F. Stajano and R. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In 7th International Workshop on Security Protocols, pages 172-194. Springer-Verlag, 1999. LNCS no. 1796.
-
(1999)
7th International Workshop on Security Protocols
, Issue.1796
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
21
-
-
33746041295
-
Chip away at privacy: Library tracking system spawns Big Brother ire
-
2 July
-
J. Stanley. Chip away at privacy: Library tracking system spawns Big Brother ire. San Francisco Chronicle, 2 July 2004.
-
(2004)
San Francisco Chronicle
-
-
Stanley, J.1
-
22
-
-
20444498069
-
Would Macy's scan Gimbels? competitive intelligence and RFID
-
Stapleton-Gray & Associates, Inc.
-
R. Stapleton-Gray. Would Macy's scan Gimbels? competitive intelligence and RFID. Technical report, Stapleton-Gray & Associates, Inc., 2003. Available at http://www.stapleton-gray.com/papers/ci-20031027.PDF.
-
(2003)
Technical Report
-
-
Stapleton-Gray, R.1
-
23
-
-
0035517587
-
An ultra small individual recognition security chip
-
K. Takaragi, M. Usami, R. Imura, R. Itsuki, and T. Satoh. An ultra small individual recognition security chip. IEEE Micro, 21(6):43-49, 2001.
-
(2001)
IEEE Micro
, vol.21
, Issue.6
, pp. 43-49
-
-
Takaragi, K.1
Usami, M.2
Imura, R.3
Itsuki, R.4
Satoh, T.5
-
24
-
-
33745778759
-
-
A. Tanenbaum, G. Gaydadjiev, B. Crispo, M. Rieback, D. Stafylarakis, and C. Zhang. The RFID Guardian project. URL: http://www.cs.vu.nl/~melanie/rfid_guardian/people.html.
-
The RFID Guardian Project
-
-
Tanenbaum, A.1
Gaydadjiev, G.2
Crispo, B.3
Rieback, M.4
Stafylarakis, D.5
Zhang, C.6
-
26
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Hutter et al., editor, Springer-Verlag, LNCS
-
S. A. Weis, S. Sarma, R. Rivest, and D. Engels. Security and privacy aspects of low-cost radio frequency identification systems. In Hutter et al., editor, First International Conference on Security in Pervasive Computing (SPC), pages 201-212. Springer-Verlag, 2003. LNCS no. 2802.
-
(2003)
First International Conference on Security in Pervasive Computing (SPC)
, Issue.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.2
Rivest, R.3
Engels, D.4
|