-
1
-
-
84941148989
-
-
Referenced 2006
-
ECRYPT (European network for excellence in cryptology), stream cipher project Web page, 2006. Referenced 2006 at http://www.ecrypt.eu.org/stream/.
-
(2006)
-
-
-
3
-
-
33947515842
-
Reducing time complexity in RFID systems
-
B. Preneel and S. Tavares, editors, Lecture Notes in Computer Science. Springer-Verlag
-
G. Avoine, E. Dysli, and P. Oechslin. Reducing time complexity in RFID systems. In B. Preneel and S. Tavares, editors, Selected Areas in Cryptography - SAC 2005, Lecture Notes in Computer Science. Springer-Verlag, 2005.
-
(2005)
Selected Areas in Cryptography - SAC 2005
-
-
Avoine, G.1
Dysli, E.2
Oechslin, P.3
-
4
-
-
84877887414
-
Security analysis of a cryptographically-enabled RFID device
-
P. McDaniel, editor, USENIX
-
S. Bono, M. Green, A. Stubblefield, A. Juels, A. Rubin, and M. Szydlo. Security analysis of a cryptographically-enabled RFID device. In P. McDaniel, editor, 14th USENIX Security Symposium, pages 1-16. USENIX, 2005. Dedicated Web site at www.rfidanalysis.org.
-
(2005)
14th USENIX Security Symposium
, pp. 1-16
-
-
Bono, S.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.5
Szydlo, M.6
-
5
-
-
84856371944
-
Ge uses RFID to secure cargo
-
12 January. Referenced 2006
-
J. Collins. Ge uses RFID to secure cargo. RFID Journal, 12 January 2005. Referenced 2006 at http://www.rfidjournal.com/article/articleview/1317/1/1/.
-
(2005)
RFID Journal
-
-
Collins, J.1
-
7
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
M. Joye and J.-J. Quisquater, editors, Workshop on Cryptographic Hardware and Embedded Systems - CHES '04, Springer-Verlag
-
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer. Strong authentication for RFID systems using the AES algorithm. In M. Joye and J.-J. Quisquater, editors, Workshop on Cryptographic Hardware and Embedded Systems - CHES '04, volume 3156 of Lecture Notes in Computer Science, pages 357-370. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
9
-
-
35048899238
-
Universal re-encryption for mixnets
-
T. Okamoto, editor, RSA Conference - Cryptographers' Track (CT-RSA)
-
P. Golle, M. Jakobsson, A. Juels, and P. Syverson. Universal re-encryption for mixnets. In T. Okamoto, editor, RSA Conference - Cryptographers' Track (CT-RSA), volume 2964 of Lecture Notes in Computer Science, pages 163-178, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2964
, pp. 163-178
-
-
Golle, P.1
Jakobsson, M.2
Juels, A.3
Syverson, P.4
-
16
-
-
23944476196
-
Minimalist cryptography for low-cost RFID tags
-
C. Blundo and S. Cimato, editors, The Fourth International Conference on Security in Communication Networks - SCN 2004, Springer-Verlag
-
A. Juels. Minimalist cryptography for low-cost RFID tags. In C. Blundo and S. Cimato, editors, The Fourth International Conference on Security in Communication Networks - SCN 2004, volume 3352 of Lecture Notes in Computer Science, pages 149-164. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3352
, pp. 149-164
-
-
Juels, A.1
-
18
-
-
33749028998
-
Strengthing EPC tags against cloning
-
ACM Press
-
A. Juels. Strengthing EPC tags against cloning. In ACM Workshop on Wireless Security (WiSe), pages 67-76. ACM Press, 2005.
-
(2005)
ACM Workshop on Wireless Security (WiSe)
, pp. 67-76
-
-
Juels, A.1
-
19
-
-
33144457479
-
RFID security and privacy: A research survey
-
To appear. Online version referenced 2005
-
A. Juels. RFID security and privacy: A research survey. J-SAC, 2006. To appear. Online version referenced 2005 at http://www.rsasecurity.com/rsalabs/ node.asp?id=2937.
-
(2006)
J-SAC
-
-
Juels, A.1
-
20
-
-
18744409344
-
The blocker tag: Selective blocking of RFID tags for consumer privacy
-
V. Atluri, editor, ACM Press
-
A. Juels, R.L. Rivest, and M. Szydlo. The blocker tag: Selective blocking of RFID tags for consumer privacy. In V. Atluri, editor, 8th ACM Conference on Computer and Communications Security, pages 103-111. ACM Press, 2003.
-
(2003)
8th ACM Conference on Computer and Communications Security
, pp. 103-111
-
-
Juels, A.1
Rivest, R.L.2
Szydlo, M.3
-
21
-
-
33144459893
-
High-power proxies for enhancing RFID privacy and utility
-
G. Danezis and D. Martin, editors.
-
A. Juels, P. Syverson, and D. Bailey. High-power proxies for enhancing RFID privacy and utility. In G. Danezis and D. Martin, editors. Privacy Enhancing Technologies (PET), 2005.
-
(2005)
Privacy Enhancing Technologies (PET)
-
-
Juels, A.1
Syverson, P.2
Bailey, D.3
-
22
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
Springer-Verlag
-
A. Juels and S. Weis. Authenticating pervasive devices with human protocols. In Advances in Cryptology - CRYPTO 2005, pages 293-308. Springer-Verlag, 2005.
-
(2005)
Advances in Cryptology - CRYPTO 2005
, pp. 293-308
-
-
Juels, A.1
Weis, S.2
-
24
-
-
33749011985
-
Disabling RFID tags with visible confirmation: Clipped tags are silenced (short paper)
-
S. De Capitani di Vimercati and R. Dingledine, editors
-
G. Karjoth and P. Moskowitz. Disabling RFID tags with visible confirmation: Clipped tags are silenced (short paper). In S. De Capitani di Vimercati and R. Dingledine, editors, Workshop on Privacy in the Electronic Society (WPES), 2005.
-
(2005)
Workshop on Privacy in the Electronic Society (WPES)
-
-
Karjoth, G.1
Moskowitz, P.2
-
25
-
-
33749013010
-
Privacy for RFID through trusted computing (short paper)
-
S. De Capitani di Vimercati and R. Dingledine, editors
-
D. Molnar, A. Soppera, and D. Wagner. Privacy for RFID through trusted computing (short paper). In S. De Capitani di Vimercati and R. Dingledine, editors, Workshop on Privacy in the Electronic Society (WPES), 2005.
-
(2005)
Workshop on Privacy in the Electronic Society (WPES)
-
-
Molnar, D.1
Soppera, A.2
Wagner, D.3
-
26
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
B. Pfitzmann and P. McDaniel, editors, ACM Press
-
D. Molnar and D. Wagner. Privacy and security in library RFID: Issues, practices, and architectures. In B. Pfitzmann and P. McDaniel, editors, ACM Conference on Communications and Computer Security, pages 210 - 219, ACM Press, 2004.
-
(2004)
ACM Conference on Communications and Computer Security
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
28
-
-
0037144430
-
Physical one-way functions
-
September
-
R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld. Physical one-way functions. Science, 297:2026-2030, September 2002.
-
(2002)
Science
, vol.297
, pp. 2026-2030
-
-
Pappu, R.1
Recht, B.2
Taylor, J.3
Gershenfeld, N.4
-
29
-
-
26444435642
-
RFID Guardian: A battery-powered mobile device for RFID privacy management
-
Colin Boyd and Juan Manuel Gonzalez Nieto, editors, Australasian Conference on Information Security and Privacy - ACISP 2005, Springer-Verlag
-
M. Rieback, B. Crispo, and A. Tanenbaum. RFID Guardian: A battery-powered mobile device for RFID privacy management. In Colin Boyd and Juan Manuel Gonzalez Nieto, editors, Australasian Conference on Information Security and Privacy - ACISP 2005, volume 3574 of Lecture Notes in Computer Science, pages 184-194. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3574
, pp. 184-194
-
-
Rieback, M.1
Crispo, B.2
Tanenbaum, A.3
-
30
-
-
33644541758
-
Extending the EPC network - The potential of RFID in anti-counterfeiting
-
ACM Press
-
T. Staake, F. Thiesse, and E. Fleisch. Extending the EPC network - the potential of RFID in anti-counterfeiting. In ACM Symposium on Applied Computing, pages 1607-1612. ACM Press, 2005.
-
(2005)
ACM Symposium on Applied Computing
, pp. 1607-1612
-
-
Staake, T.1
Thiesse, F.2
Fleisch, E.3
-
31
-
-
34547618979
-
Rfid-tags for anti-counterfeiting
-
Springer-Verlag, To appear
-
P. Tuyls and L. Batina. Rfid-tags for anti-counterfeiting. In CT-RSA 06. Springer-Verlag, 2006. To appear.
-
(2006)
CT-RSA 06
-
-
Tuyls, P.1
Batina, L.2
|