-
1
-
-
85081452927
-
-
RFID Technology and EPC in Retail. Symbol Technologies, Inc, 2004.
-
RFID Technology and EPC in Retail. Symbol Technologies, Inc, 2004.
-
-
-
-
2
-
-
85081444871
-
-
Wal-Mart details RFID requirement. RFID Journal, 2003.
-
Wal-Mart details RFID requirement. RFID Journal, 2003.
-
-
-
-
3
-
-
85081444455
-
-
Gillette confirms RFID purchase. RFID Journal, 2003.
-
Gillette confirms RFID purchase. RFID Journal, 2003.
-
-
-
-
4
-
-
33644541758
-
Extending the EPC network - The potential of RFID in anti-counterfeiting
-
ACM Press, Santa Fe, USA
-
Staake T, Thiesse F, Fleisch E. Extending the EPC network - The potential of RFID in anti-counterfeiting. In Proc. 2005 ACM Symp. Applied Computing, ACM Press, Santa Fe, USA, 2005, pp.1607-1612.
-
(2005)
Proc. 2005 ACM Symp. Applied Computing
, pp. 1607-1612
-
-
Staake, T.1
Thiesse, F.2
Fleisch, E.3
-
5
-
-
2942532029
-
Euro bank notes to embed RFID chips by 2005
-
Yoshida J. Euro bank notes to embed RFID chips by 2005. EE Times, 2001.
-
(2001)
EE Times
-
-
Yoshida, J.1
-
6
-
-
85081446749
-
-
Harris G. Tiny antennas to keep tabs on U.S. drugs. New York Times, 2004.
-
Harris G. Tiny antennas to keep tabs on U.S. drugs. New York Times, 2004.
-
-
-
-
8
-
-
35248832722
-
-
Juels A, Pappu R. Squealing euros: Privacy-protection in RFID-enabled banknotes. In Proc. Financial Cryptography, Gosier, Guadeloupe, FWI, LNCS 2742, Springer-Verlag, 2003, pp.103-121.
-
Juels A, Pappu R. Squealing euros: Privacy-protection in RFID-enabled banknotes. In Proc. Financial Cryptography, Gosier, Guadeloupe, FWI, LNCS 2742, Springer-Verlag, 2003, pp.103-121.
-
-
-
-
9
-
-
85081450901
-
-
Biannual Information on the Counterfeiting of the Euro. ECB Press. 2004.
-
Biannual Information on the Counterfeiting of the Euro. ECB Press. 2004.
-
-
-
-
10
-
-
33646001554
-
Watchdogs push for RFID laws
-
Baard M. Watchdogs push for RFID laws. Wired News, 2004.
-
(2004)
Wired News
-
-
Baard, M.1
-
11
-
-
35248872610
-
-
Sarma S E, Weis S A, Engels D W. RFID systems and security and privacy implications. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, San Franciso Bay, USA, LNCS 2523, 2002, pp.454-470.
-
Sarma S E, Weis S A, Engels D W. RFID systems and security and privacy implications. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, San Franciso Bay, USA, LNCS 2523, 2002, pp.454-470.
-
-
-
-
12
-
-
26444443915
-
A scalable and provably secure hash based RFID protocol
-
Kauai Island, Hawaii, USA, IEEE Computer Society Press
-
Avoine G, Oechslin P. A scalable and provably secure hash based RFID protocol. In Proc. The 2nd IEEE Int. Workshop on Pervasive Computing and Communication Security, Kauai Island, Hawaii, USA, IEEE Computer Society Press, 2005, pp.110-114.
-
(2005)
Proc. The 2nd IEEE Int. Workshop on Pervasive Computing and Communication Security
, pp. 110-114
-
-
Avoine, G.1
Oechslin, P.2
-
13
-
-
33749028998
-
Strengthening EPC tags against cloning
-
New York City, USA, ACM Press
-
Juels A. Strengthening EPC tags against cloning. In Proc. the 4th ACM Workshop on Wireless Security, New York City, USA, ACM Press, 2005, pp.67-76.
-
(2005)
Proc. the 4th ACM Workshop on Wireless Security
, pp. 67-76
-
-
Juels, A.1
-
14
-
-
23944476196
-
Minimalist cryptography for low-cost RFID tags
-
Proc. The Fourth International Conf. Security in Communication Network, Amalfi, Italy, Springer-Verlag
-
Juels A. Minimalist cryptography for low-cost RFID tags. In Proc. The Fourth International Conf. Security in Communication Network, Amalfi, Italy, LNCS 3352, Springer-Verlag, 2004, pp.149-164.
-
(2004)
LNCS
, vol.3352
, pp. 149-164
-
-
Juels, A.1
-
16
-
-
8744257469
-
A proposal for authentication protocol in a security layer for RFID smart tags
-
Feldhofer M. A proposal for authentication protocol in a security layer for RFID smart tags. In The 12th IEEE Mediterranean Electrotechnical Conf., 2004, 2: 759-762.
-
(2004)
The 12th IEEE Mediterranean Electrotechnical Conf
, vol.2
, pp. 759-762
-
-
Feldhofer, M.1
-
17
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
Proc. Workshop on Cryptographic Hardware and Embedded Systems, Joye M, Quisquater J J eds, Cambridge, MA, USA, Springer-Verlag
-
Feldhofer M, Dominikus S, Wolkerstorfer J. Strong authentication for RFID systems using the AES algorithm. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, Joye M, Quisquater J J (eds.), Cambridge, MA, USA, LNCS 3156, Springer-Verlag, 2004, pp.357-370.
-
(2004)
LNCS
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
18
-
-
24944575863
-
Cryptographic approach to "privacy-friendly" tags
-
MIT, MA, USA
-
Ohkubo M, Suzuki K, Kinoshita S. Cryptographic approach to "privacy-friendly" tags. In Proc. RFID Privacy Workshop, MIT, MA, USA, 2003.
-
(2003)
Proc. RFID Privacy Workshop
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
19
-
-
26444478592
-
RFID traceability: A multilayer problem
-
Proc. Financial Cryptography, Roseau, Dominica, Springer-Verlag
-
Avoine G, Oechslin P. RFID traceability: A multilayer problem. In Proc. Financial Cryptography, Roseau, Dominica, LNCS 3570, Springer-Verlag, 2005, pp.125-140.
-
(2005)
LNCS
, vol.3570
, pp. 125-140
-
-
Avoine, G.1
Oechslin, P.2
-
21
-
-
85081449788
-
-
860MHz-930MHz class I radio frequency identification tag: Radio frequency and logical communication interface specification. Technical Report MIT-AUTOID-TR-007, Auto-ID Center, 2002
-
860MHz-930MHz class I radio frequency identification tag: Radio frequency and logical communication interface specification. Technical Report MIT-AUTOID-TR-007, Auto-ID Center, 2002.
-
-
-
-
22
-
-
33750402779
-
Zero-knowledge device authentication: Privacy and security enhanced RFID preserving business value and consumer convenience
-
New Brunswick, Canada
-
Engberg S, Harning M, Damsgaard Jensen C. Zero-knowledge device authentication: Privacy and security enhanced RFID preserving business value and consumer convenience. In Proc. The Second Annual Conference on Privacy, Security and Trust, New Brunswick, Canada, 2004, 89-101.
-
(2004)
Proc. The Second Annual Conference on Privacy, Security and Trust
, pp. 89-101
-
-
Engberg, S.1
Harning, M.2
Damsgaard Jensen, C.3
-
23
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
Washington DC, USA, ACM Press
-
Molnar D, Wagner D. Privacy and security in library RFID: Issues, practices, and architectures. In Proc. Conference on Computer and Communications Security, Washington DC, USA, ACM Press, 2004, pp.210-219.
-
(2004)
Proc. Conference on Computer and Communications Security
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
24
-
-
85081452427
-
-
Atmel e5561 data sheet. Atmel Corporation. 2003.
-
Atmel e5561 data sheet. Atmel Corporation. 2003.
-
-
-
-
25
-
-
85081443333
-
-
Atmel T5557 data sheet. Atmel Corporation. 2003.
-
Atmel T5557 data sheet. Atmel Corporation. 2003.
-
-
-
-
26
-
-
85081445179
-
-
Atmel T5552 data sheet. Atmel Corporation. 2003.
-
Atmel T5552 data sheet. Atmel Corporation. 2003.
-
-
-
-
27
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Proc. CRYPTO'99, Santa Barbara, USA, Springer-Verlag
-
Fujisaki E, Okamoto T. Secure integration of asymmetric and symmetric encryption schemes. In Proc. CRYPTO'99, Santa Barbara, USA, LNCS 1666, Springer-Verlag, 1999, pp.537-554.
-
(1999)
LNCS
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
30
-
-
84946840347
-
Short signatures from the Weil pairing
-
Proc. ASIACRYPT'01, Gold Coast, Australia, Springer-Verlag
-
Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing. In Proc. ASIACRYPT'01, Gold Coast, Australia, LNCS 2139, Springer-Verlag, 2001, pp.514-532.
-
(2001)
LNCS
, vol.2139
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
|