-
2
-
-
26444478592
-
Rfid traceability: A multilayer problem
-
G. Avoine and P. Oechslin. Rfid traceability: A multilayer problem. In Financial Cryptography, pages 125-140, 2005.
-
(2005)
Financial Cryptography
, pp. 125-140
-
-
Avoine, G.1
Oechslin, P.2
-
3
-
-
35048891868
-
Keying hash functions for message authentication
-
M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In Crypto '96, pages 1-15.
-
Crypto '96
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
4
-
-
84877887414
-
Security analysis of a cryptographically-enabled RFID device
-
S. C. Bono, M. Green, A. Stubblefield, A. Juels, A. D. Rubin, and M. Szydlo. Security analysis of a cryptographically-enabled RFID device. In USENIX Security Symposium, pages 1-16, 2005.
-
(2005)
USENIX Security Symposium
, pp. 1-16
-
-
Bono, S.C.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.D.5
Szydlo, M.6
-
5
-
-
34748845985
-
-
K. P. Fishkin and S. Roy. Enhancing RFID privacy via antenna energy analysis, tech. memo IRS-TR-03-012, Intel Research Seattle, 2003.
-
K. P. Fishkin and S. Roy. Enhancing RFID privacy via antenna energy analysis, tech. memo IRS-TR-03-012, Intel Research Seattle, 2003.
-
-
-
-
6
-
-
2942558265
-
An RFID bill of rights
-
October
-
S. Garfinkel. An RFID bill of rights. Technology Review, page 35, October 2002.
-
(2002)
Technology Review
, pp. 35
-
-
Garfinkel, S.1
-
7
-
-
20844459862
-
RFID privacy: An overview of problems and proposed solutions
-
S. L. Garfinkel, A. Juels, and R. Pappu. RFID privacy: An overview of problems and proposed solutions. IEEE Security & Privacy, 3(3):34-43, 2005.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.3
, pp. 34-43
-
-
Garfinkel, S.L.1
Juels, A.2
Pappu, R.3
-
8
-
-
35048899238
-
Universal re-encryption for mixnets
-
P. Golle, M. Jakobsson, A. Juels, and P. F. Syverson. Universal re-encryption for mixnets. In CT-RSA, pages 163-178, 2004.
-
(2004)
CT-RSA
, pp. 163-178
-
-
Golle, P.1
Jakobsson, M.2
Juels, A.3
Syverson, P.F.4
-
9
-
-
23944476196
-
-
A. Juels. Minimalist cryptography for low-cost RFID tags. In SCN, pages 149-164, 2004.
-
A. Juels. Minimalist cryptography for low-cost RFID tags. In SCN, pages 149-164, 2004.
-
-
-
-
10
-
-
35248832722
-
Squealing Euros: Privacy protection in RFID-enabled banknotes
-
A. Juels and R. Pappu. Squealing Euros: Privacy protection in RFID-enabled banknotes. In Financial Cryptography, pages 103-121, 2003.
-
(2003)
Financial Cryptography
, pp. 103-121
-
-
Juels, A.1
Pappu, R.2
-
16
-
-
33745597876
-
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
-
D. Moinar, A. Soppera, and D. Wagner. A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In Selected Areas in Cryptography, pages 276-290, 2005.
-
(2005)
Selected Areas in Cryptography
, pp. 276-290
-
-
Moinar, D.1
Soppera, A.2
Wagner, D.3
-
17
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures. In ACM
-
D. Moinar and D. Wagner. Privacy and security in library RFID: issues, practices, and architectures. In ACM Conference on Computer and Communications Security, pages 210-219, 2004.
-
(2004)
Conference on Computer and Communications Security
, pp. 210-219
-
-
Moinar, D.1
Wagner, D.2
-
18
-
-
25444432606
-
RFID privacy issues and technical challenges
-
M. Ohkubo, K. Suzuki, and S. Kinoshita. RFID privacy issues and technical challenges. ACM Communications, 48(9):66-71, 2005.
-
(2005)
ACM Communications
, vol.48
, Issue.9
, pp. 66-71
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
19
-
-
26444435642
-
Rfid guardian: A battery-powered mobile device for rfid privacy management
-
M. R. Rieback, B. Crispo, and A. S. Tanenbaum. Rfid guardian: A battery-powered mobile device for rfid privacy management. In ACISP, pages 184-194, 2005.
-
(2005)
ACISP
, pp. 184-194
-
-
Rieback, M.R.1
Crispo, B.2
Tanenbaum, A.S.3
-
20
-
-
2942623480
-
White paper: RFID systems, security and privacy implications
-
Technical Report MIT-AUTOID-WH-014, Auto-ID Center, MIT, November
-
S. Sarma, S. Weis, and D. Engels. White paper: RFID systems, security and privacy implications. Technical Report MIT-AUTOID-WH-014, Auto-ID Center, MIT, November 2002.
-
(2002)
-
-
Sarma, S.1
Weis, S.2
Engels, D.3
-
21
-
-
68549104046
-
Physical security devices for computer subsystems: A survey of attacks and defences
-
S. Weigart. Physical security devices for computer subsystems: A survey of attacks and defences. In Workshop on Cryptographic Hardware and Embedded Systems, pages 302-317, 2000.
-
(2000)
Workshop on Cryptographic Hardware and Embedded Systems
, pp. 302-317
-
-
Weigart, S.1
-
22
-
-
34748825865
-
-
S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels. Security and privacy aspects of low-cost radio frequency identification systems. In SPC, pages 20.1-2.12, 2003.
-
S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels. Security and privacy aspects of low-cost radio frequency identification systems. In SPC, pages 20.1-2.12, 2003.
-
-
-
-
24
-
-
33645970405
-
Integrity improvements to an rfid privacy protection protocol, for anti-counterfeiting
-
X. Zhang and B. King. Integrity improvements to an rfid privacy protection protocol, for anti-counterfeiting. In ISC, pages 474-481, 2005.
-
(2005)
ISC
, pp. 474-481
-
-
Zhang, X.1
King, B.2
|