-
3
-
-
36248973644
-
Cryptanalysis of Two Lightweight RFID Authentication Schemes
-
March
-
B. Defend, K. Fu and A. Juels. Cryptanalysis of Two Lightweight RFID Authentication Schemes. In: Proc. of PERSEC'07, March 2007.
-
(2007)
Proc. of PERSEC'07
-
-
Defend, B.1
Fu, K.2
Juels, A.3
-
4
-
-
35248832722
-
Squealing euros: Privacy protection in RFID-enabled banknotes
-
Proc. of FC'03, Springer-Verlag
-
A. Juels and R. Pappu. Squealing euros: Privacy protection in RFID-enabled banknotes. In: Proc. of FC'03, LNCS 2742, pp. 103-12L Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2742
-
-
Juels, A.1
Pappu, R.2
-
5
-
-
23944476196
-
Minimalist Cryptography for Low-Cost RFID Tags
-
Proc. of SCN'04, Springer-Verlag
-
A. Juels. Minimalist Cryptography for Low-Cost RFID Tags. In: Proc. of SCN'04, LNCS 3352, pp. 149-164. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3352
, pp. 149-164
-
-
Juels, A.1
-
6
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
Proc. of CRYPTO'05, Springer-Verlag
-
A. Juels and S. Weis. Authenticating pervasive devices with human protocols. In: Proc. of CRYPTO'05, LNCS 3126, pp. 293-308. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3126
, pp. 293-308
-
-
Juels, A.1
Weis, S.2
-
7
-
-
33144457479
-
RFID Security and Privacy: A Research Survey
-
Feb
-
A. Juels. RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications, 24(2): 381-394, Feb. 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
8
-
-
84958984270
-
Efficient Algorithms for Computing Differential Properties of Addition
-
Proc. of FSE '01, Springer-Verlag
-
H. Lipmaa and S. Moriai. Efficient Algorithms for Computing Differential Properties of Addition. In: Proc. of FSE '01, LNCS 2355, pp. 336-350. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2355
, pp. 336-350
-
-
Lipmaa, H.1
Moriai, S.2
-
9
-
-
14844294769
-
Privacy and Security in Library RFID: Issues, Practices, and Architectures
-
ACM Press
-
D. Molnar and D. Wagner. Privacy and Security in Library RFID: Issues, Practices, and Architectures. In: Proc. of CCS'04, pp. 210-219. ACM Press, 2004.
-
(2004)
Proc. of CCS'04
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
10
-
-
33745597876
-
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
-
Proc. of SAC'05, Springer-Verlag
-
D. Molnar, A. Soppera, and D. Wagner. A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. In: Proc. of SAC'05, LNCS 3897, pp. 276-290. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3897
, pp. 276-290
-
-
Molnar, D.1
Soppera, A.2
Wagner, D.3
-
13
-
-
33750067948
-
2AP: A Minimalist Mutual-Authentication Protocol for Low-cost RFID Tags
-
Proc. of International Conference on Ubiquitous Intelligence and Computing UIC'06, Springer-Verlag
-
2AP: A Minimalist Mutual-Authentication Protocol for Low-cost RFID Tags. In: Proc. of International Conference on Ubiquitous Intelligence and Computing UIC'06, LNCS 4159, pp. 912-923. Springer-Verlag, 2006.
-
(2006)
LNCS
, vol.4159
, pp. 912-923
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
14
-
-
33845386166
-
Lightweight authentication protocols for low-cost RFID tags
-
I. Vajda and L. Buttyan. Lightweight authentication protocols for low-cost RFID tags. In: Proc. of UBICOMP'03, 2003.
-
(2003)
Proc. of UBICOMP'03
-
-
Vajda, I.1
Buttyan, L.2
-
15
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Proc. of 1st Int. Conf. on Security in Pervasive Computing, Springer-Verlag
-
S. Weis, S. Sarma, R. Rivest, and D. Engels. Security and privacy aspects of low-cost radio frequency identification systems. In: Proc. of 1st Int. Conf. on Security in Pervasive Computing, LNCS 2802, pp. 201-212. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2802
, pp. 201-212
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
16
-
-
33144480778
-
Security parallels between people and pervasive devices
-
IEEE Computer Society Press
-
S. Weis. Security parallels between people and pervasive devices. In: Proc. of PERSEC'05, pp. 105-109. IEEE Computer Society Press, 2005.
-
(2005)
Proc. of PERSEC'05
, pp. 105-109
-
-
Weis, S.1
|