-
1
-
-
33144457479
-
RFID Security and Privacy: A Research Survey
-
February
-
A. Juels, "RFID Security and Privacy: A Research Survey," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 381-394, February 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
2
-
-
34548812979
-
ISO/IEC 9798-2: Information technology - Security techniques - Entity authentication-Mechanisms using symmetric encipherment algorithms
-
International Organisation for Standardization ISO
-
International Organisation for Standardization (ISO), "ISO/IEC 9798-2: Information technology - Security techniques - Entity authentication-Mechanisms using symmetric encipherment algorithms," 1999.
-
(1999)
-
-
-
3
-
-
33744940544
-
Efficient RFID Authentication Protocol for Ubiquitous Computing Environment
-
Embedded and Ubiquitous Computing, EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings, Springer, December
-
E. Y. Choi, S.-M. Lee, and D. H. Lee, "Efficient RFID Authentication Protocol for Ubiquitous Computing Environment." in Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki., Japan, December 6-9, 2005, Proceedings, ser. Lecture Notes in Computer Science, vol. 3823. Springer, December 2005, pp. 945-954.
-
(2005)
ser. Lecture Notes in Computer Science
, vol.3823
, pp. 945-954
-
-
Choi, E.Y.1
Lee, S.-M.2
Lee, D.H.3
-
4
-
-
33847330246
-
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks
-
Athens, Greece: IEEE Computer Society, September
-
T. Dimitriou, "A Lightweight RFID Protocol to protect against Traceability and Cloning attacks," in First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm 2005), Athens, Greece, 59 September 2005, Proceedings. Athens, Greece: IEEE Computer Society, September 2005, pp. 59-66.
-
(2005)
First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm 2005), Athens, Greece, 59 September 2005, Proceedings
, pp. 59-66
-
-
Dimitriou, T.1
-
5
-
-
2942625823
-
Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers
-
IEEE Computer Society, March
-
D. Henrici and P. Müller, "Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers," in 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), Orlando, FL, USA, 14-17 March 2004, Proceedings. IEEE Computer Society, March 2004, pp. 149-153.
-
(2004)
2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), Orlando, FL, USA, 14-17 March 2004, Proceedings
, pp. 149-153
-
-
Henrici, D.1
Müller, P.2
-
6
-
-
49049090312
-
Secure and Low-cost RFID Authentication Protocols
-
Y. Lee and I. Verbauwhede, "Secure and Low-cost RFID Authentication Protocols," in 2nd IEEE Workshop on Adaptive Wireless Networks (AWiN), November 28, 2005, St. Louis, MO, 2005.
-
(2005)
2nd IEEE Workshop on Adaptive Wireless Networks (AWiN), November 28, 2005, St. Louis, MO
-
-
Lee, Y.1
Verbauwhede, I.2
-
7
-
-
24644501824
-
-
K. Rhee, J. Kwak, S. Kim, and D. Won, Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. in Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, ser. Lecture Notes in Computer Science, D. Hutter and M. Ullmann, Eds., 3450. Springer, April 2005, pp. 70-84.
-
K. Rhee, J. Kwak, S. Kim, and D. Won, "Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment." in Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, ser. Lecture Notes in Computer Science, D. Hutter and M. Ullmann, Eds., vol. 3450. Springer, April 2005, pp. 70-84.
-
-
-
-
8
-
-
35048876270
-
-
S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems, in Security in Pervasive Computing, 1st Annual Conference on Security in Pervasive Computing, Boppard, Germany, March 12-14, 2003, Revised Papers, ser. Lecture Notes in Computer Science, D. Hutter, G. Müller, W. Stephan, and M. Ullmann, Eds., 2802. Springer, March 2003, pp. 201-212.
-
S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," in Security in Pervasive Computing, 1st Annual Conference on Security in Pervasive Computing, Boppard, Germany, March 12-14, 2003, Revised Papers, ser. Lecture Notes in Computer Science, D. Hutter, G. Müller, W. Stephan, and M. Ullmann, Eds., vol. 2802. Springer, March 2003, pp. 201-212.
-
-
-
-
9
-
-
35048859848
-
-
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, Strong Authentication for RFID Systems using the AES Algorithm, in Cryptographic Hardware and Embedded Systems - CHES 2004, 6th International Workshop, Cambridge, MA, USA, August 11-13, 2004, Proceedings, ser. Lecture Notes in Computer Science, M. Joye and J.-J. Quisquater, Eds., 3156. Springer, August 2004, pp. 357-370.
-
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, "Strong Authentication for RFID Systems using the AES Algorithm," in Cryptographic Hardware and Embedded Systems - CHES 2004, 6th International Workshop, Cambridge, MA, USA, August 11-13, 2004, Proceedings, ser. Lecture Notes in Computer Science, M. Joye and J.-J. Quisquater, Eds., vol. 3156. Springer, August 2004, pp. 357-370.
-
-
-
-
10
-
-
33746739905
-
AES Implementation on a Grain of Sand
-
October
-
M. Feldhofer, J. Wolkerstorfer, and V Rijmen, "AES Implementation on a Grain of Sand," IEE Proceedings on Information Security, vol. 152, no. 1, pp. 13-20, October 2005.
-
(2005)
IEE Proceedings on Information Security
, vol.152
, Issue.1
, pp. 13-20
-
-
Feldhofer, M.1
Wolkerstorfer, J.2
Rijmen, V.3
-
11
-
-
34548830043
-
A Case Against Currently Used Hash Functions in RFID Protocols
-
S. Dominikus, Ed, July
-
M. Feldhofer and C. Rechberger, "A Case Against Currently Used Hash Functions in RFID Protocols," in Workshop on RFID Security 2006 (RFIDSec06), July 12-14, Graz, Austria, Proceedings, S. Dominikus, Ed., July 2006, pp. 109-122.
-
(2006)
Workshop on RFID Security 2006 (RFIDSec06), July 12-14, Graz, Austria, Proceedings
, pp. 109-122
-
-
Feldhofer, M.1
Rechberger, C.2
-
12
-
-
34548842059
-
Hardware Aspects of Elliptic Curve Cryptography,
-
Ph.D. dissertation, Graz University of Technology, August
-
J. Wolkerstorfer, "Hardware Aspects of Elliptic Curve Cryptography," Ph.D. dissertation, Graz University of Technology, August 2004.
-
(2004)
-
-
Wolkerstorfer, J.1
|