-
1
-
-
33845531085
-
Radio frequency identification: adversary model and attacks on existing protocols
-
Avoine G. Radio frequency identification: adversary model and attacks on existing protocols. Technical Report LASEC-REPORT-2005-001 (September 2005)
-
(2005)
Technical Report LASEC-REPORT-2005-001
-
-
Avoine, G.1
-
5
-
-
24144453496
-
Noise-tolerant learning, the parity problem, and the statistical query model
-
Blum A., Kalai A., and Wasserman H. Noise-tolerant learning, the parity problem, and the statistical query model. Journal of the ACM 50 4 (July 2003) 506-519
-
(2003)
Journal of the ACM
, vol.50
, Issue.4
, pp. 506-519
-
-
Blum, A.1
Kalai, A.2
Wasserman, H.3
-
6
-
-
84877887414
-
Security Analysis of a Cryptographically-Enabled RFID Device
-
Bono S., Green M., Stubblefield A., Juels A., Rubin A., and Szydlo M. Security Analysis of a Cryptographically-Enabled RFID Device. Procedings of the 14th USENIX Security (2005) 1-16
-
(2005)
Procedings of the 14th USENIX Security
, pp. 1-16
-
-
Bono, S.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.5
Szydlo, M.6
-
7
-
-
84976295016
-
Distance-bounding protocols
-
Advances in Cryptology - EURO-CRYPT'93
-
Brands S., and Chaum D. Distance-bounding protocols. Advances in Cryptology - EURO-CRYPT'93. Lecture Notes in Computer Science vol. 765 (1994) 344-359
-
(1994)
Lecture Notes in Computer Science
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
9
-
-
33745771753
-
Noisy tags: a pretty good key exchange protocol for RFID tags
-
International Conference on Smart Card Research and Advanced Applications - CARDIS
-
Castelluccia C., and Avoine G. Noisy tags: a pretty good key exchange protocol for RFID tags. International Conference on Smart Card Research and Advanced Applications - CARDIS. Lecture Notes in Computer Science vol. 3928 (2006) 289-299
-
(2006)
Lecture Notes in Computer Science
, vol.3928
, pp. 289-299
-
-
Castelluccia, C.1
Avoine, G.2
-
10
-
-
84881072062
-
A computing procedure for quantification theory
-
Davis M., and Putnam H. A computing procedure for quantification theory. Journal of the ACM (1960) 201-215
-
(1960)
Journal of the ACM
, pp. 201-215
-
-
Davis, M.1
Putnam, H.2
-
11
-
-
1542341270
-
Location-based authentication: grounding cyberspace for better security
-
Denning D.E., and MacDoran P.F. Location-based authentication: grounding cyberspace for better security. Computer Fraud and Security 1996 2 (1996) 12-16
-
(1996)
Computer Fraud and Security
, vol.1996
, Issue.2
, pp. 12-16
-
-
Denning, D.E.1
MacDoran, P.F.2
-
17
-
-
33646820465
-
GT6 algorithm solves the extended DIMACS 32-bit parity problem
-
Greentech Computing Limited, London, England
-
Greentech Computing. GT6 algorithm solves the extended DIMACS 32-bit parity problem. Technical Report (1998), Greentech Computing Limited, London, England
-
(1998)
Technical Report
-
-
Greentech Computing1
-
18
-
-
33750459716
-
Supply chain information sharing in a micro prediction market
-
Guo Z., Fang F., and Whinston A.B. Supply chain information sharing in a micro prediction market. Decision Support Systems 42 (2006) 1944-1958
-
(2006)
Decision Support Systems
, vol.42
, pp. 1944-1958
-
-
Guo, Z.1
Fang, F.2
Whinston, A.B.3
-
21
-
-
33749575090
-
Mobile decision support for in-store purchase decisions
-
Heijden H.V.D. Mobile decision support for in-store purchase decisions. Decision Support Systems 42 (2006) 656-663
-
(2006)
Decision Support Systems
, vol.42
, pp. 656-663
-
-
Heijden, H.V.D.1
-
24
-
-
70349284581
-
Secure human identification protocols
-
Advances in Cryptology - ASIACRYPT 2001. Boyd C. (Ed), Springer-Verlag
-
Hopper N.J., and Blum M.M. Secure human identification protocols. In: Boyd C. (Ed). Advances in Cryptology - ASIACRYPT 2001. Lecture Notes in Computer Science vol. 2248 (2001), Springer-Verlag 52-66
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.M.2
-
26
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
Advanced in Cryptology - CRYPTO'05. Shoup V. (Ed), Springer-Verlag
-
Juels A., and Weis S.A. Authenticating pervasive devices with human protocols. In: Shoup V. (Ed). Advanced in Cryptology - CRYPTO'05. Lecture Notes in Computer vol. 3126 (2005), Springer-Verlag 293-308
-
(2005)
Lecture Notes in Computer
, vol.3126
, pp. 293-308
-
-
Juels, A.1
Weis, S.A.2
-
38
-
-
0032178308
-
A two-phase algorithm for solving a class of hard satisfiability problems
-
Warners J.P., and Maaren H.V. A two-phase algorithm for solving a class of hard satisfiability problems. Operations Research Letters vol. 23 (1998) 81-88
-
(1998)
Operations Research Letters
, vol.23
, pp. 81-88
-
-
Warners, J.P.1
Maaren, H.V.2
-
39
-
-
33947505460
-
Why Some People Put These Credit Cards in the Microwave
-
Warren S. Why Some People Put These Credit Cards in the Microwave. The Wall Street Journal Online (April 10 2006) A1-A16
-
(2006)
The Wall Street Journal Online
-
-
Warren, S.1
-
40
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Weis S.A., Sarma S.E., Rivest R., and Engels D.W. Security and privacy aspects of low-cost radio frequency identification systems. Proceedings of the 1st Security in Pervasive Computing, LNCS vol. 2802 (2004) 201-212
-
(2004)
Proceedings of the 1st Security in Pervasive Computing, LNCS
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.3
Engels, D.W.4
-
41
-
-
33749379761
-
Mutual Authentication Protocol for Low-Cose RFID
-
Yang J., Park J., Lee H., Ren K., and Kim K. Mutual Authentication Protocol for Low-Cose RFID. Proceedings of the Workshop on RFID and Lightweight Cryptography (2005) 17-24
-
(2005)
Proceedings of the Workshop on RFID and Lightweight Cryptography
, pp. 17-24
-
-
Yang, J.1
Park, J.2
Lee, H.3
Ren, K.4
Kim, K.5
-
42
-
-
20844459862
-
RFID privacy: an overview of problems and proposed solutions
-
Garfinkel S., Juels A., and Pappu R. RFID privacy: an overview of problems and proposed solutions. IEEE Security and Privacy 3 3 (May-June 2005) 34-43
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 34-43
-
-
Garfinkel, S.1
Juels, A.2
Pappu, R.3
|