-
2
-
-
24644498798
-
Strong authentication for RFID systems using the AES algorithm
-
Martin Feldhofer, Sandra Dominikus, and Johannes Wolkerstorfer. Strong authentication for RFID systems using the AES algorithm. In CHES, 2004.
-
(2004)
CHES
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
3
-
-
26444442422
-
Scanning with a purpose - Supporting the fair information principles in RFID protocols
-
Hitomi Murakami, Hideyuki Nakashima, Hideyuki Tokuda, and Michiaki Yasumura, editors, Ubiquitious Computing Systems. Revised Selected Papers from the 2nd International Symposium on Ubiquitous Computing Systems (UCS 2004), November 8-9, 2004, Tokyo, Japan, Berlin, Germany, June. Springer-Verlag
-
Christian Floerkemeier, Roland Schneider, and Marc Langheinrich. Scanning with a purpose - supporting the fair information principles in RFID protocols. In Hitomi Murakami, Hideyuki Nakashima, Hideyuki Tokuda, and Michiaki Yasumura, editors, Ubiquitious Computing Systems. Revised Selected Papers from the 2nd International Symposium on Ubiquitous Computing Systems (UCS 2004), November 8-9, 2004, Tokyo, Japan, volume 3598 of Lecture Notes in Computer Science, Berlin, Germany, June 2005. Springer-Verlag.
-
(2005)
Lecture Notes in Computer Science
, vol.3598
-
-
Floerkemeier, C.1
Schneider, R.2
Langheinrich, M.3
-
4
-
-
78650880166
-
Flexible OS support and applications for trusted computing
-
T. Garfinkel, M. Rosenblum, and D. Boneh. Flexible OS support and applications for trusted computing. In HotOS-IX, 2003.
-
(2003)
HotOS-IX
-
-
Garfinkel, T.1
Rosenblum, M.2
Boneh, D.3
-
7
-
-
84859287213
-
-
IBM. IBM Trusted Linux, 2005. http://www.research.ibm.com/gsal/tcpa/.
-
(2005)
IBM Trusted Linux
-
-
-
8
-
-
84859287234
-
-
Ari Juels. A bit of privacy, 2005. http://www.rfidjournal.com/article/ articleview/1536/1/133/.
-
(2005)
A Bit of Privacy
-
-
Juels, A.1
-
9
-
-
20444478767
-
Soft blocking: Flexible blocker tags on the cheap
-
Ari Juels and J. Brainard. Soft blocking: Flexible blocker tags on the cheap. In WPES 2004, 2004.
-
(2004)
WPES 2004
-
-
Juels, A.1
Brainard, J.2
-
12
-
-
21644454794
-
Open-source applications of TCPA hardware
-
J. Marchesini, S.W. Smith, O. Wild, J. Stabiner, and A. Barsamian. Open-source applications of TCPA hardware. In Applied Computer Security Applications Conference, 2004.
-
(2004)
Applied Computer Security Applications Conference
-
-
Marchesini, J.1
Smith, S.W.2
Wild, O.3
Stabiner, J.4
Barsamian, A.5
-
13
-
-
33748087527
-
Trusted platform on demand
-
H. Maruyama, F. Seliger, N. Nagaratnam, T. Ebringer, S. Munetoh, S. Yoshihama, and T. Nakamura. Trusted platform on demand, 2004. IBM Research Report RT0564.
-
(2004)
IBM Research Report
, vol.RT0564
-
-
Maruyama, H.1
Seliger, F.2
Nagaratnam, N.3
Ebringer, T.4
Munetoh, S.5
Yoshihama, S.6
Nakamura, T.7
-
14
-
-
33748987979
-
Integrity validation infrastructure for RFID edge controllers
-
In Japanese
-
M. Nakamura, T. Mishina, and S. Munetoh. Integrity validation infrastructure for RFID edge controllers. In SCIS2005, 2005. In Japanese.
-
(2005)
SCIS2005
-
-
Nakamura, M.1
Mishina, T.2
Munetoh, S.3
-
18
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doom. Design and implementation of a TCG-based integrity measurement architecture. In Usenix Security, 2004.
-
(2004)
Usenix Security
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doom, L.4
|