-
2
-
-
33745597876
-
-
Molnar, D., Soppera, A., Wagner, D.: A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, 3897, pp. 276-290. Springer, Heidelberg (2006)
-
Molnar, D., Soppera, A., Wagner, D.: A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 276-290. Springer, Heidelberg (2006)
-
-
-
-
3
-
-
38149097415
-
A Scalable and Provably Secure Hash-Based RFID Protocol
-
Avoine, G., Oechslin, P.: A Scalable and Provably Secure Hash-Based RFID Protocol, PerSec Workshop (March 2005)
-
(2005)
PerSec Workshop (March
-
-
Avoine, G.1
Oechslin, P.2
-
7
-
-
0033296116
-
On Traveling Incognito
-
Ateniese, G., Herzberg, A., Krawczyk, H., Tsudik, G.: On Traveling Incognito. Computer Networks 31(8), 871-884 (1999)
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 871-884
-
-
Ateniese, G.1
Herzberg, A.2
Krawczyk, H.3
Tsudik, G.4
-
9
-
-
33745621564
-
-
Avoine, G., Dysli, E., Oechslin, P.: Reducing Time Complexity in RFID Systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, 3897, Springer, Heidelberg (2006)
-
Avoine, G., Dysli, E., Oechslin, P.: Reducing Time Complexity in RFID Systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, Springer, Heidelberg (2006)
-
-
-
-
12
-
-
0001636850
-
Kerberos: An Authentication Service for Open Network Systems
-
Steiner, J., Neuman, B., Schiller, J.: Kerberos: An Authentication Service for Open Network Systems. In: USENIX Winter 1988 Technical Conference, pp. 191-202 (1988)
-
(1988)
USENIX Winter 1988 Technical Conference
, pp. 191-202
-
-
Steiner, J.1
Neuman, B.2
Schiller, J.3
-
13
-
-
38149063631
-
-
Redl, S., Weber, M., Oliphant, M.: GSM and Personal Communications Handbook, Artech House (May 1998) ISBN 13: 978-0890069578
-
Redl, S., Weber, M., Oliphant, M.: GSM and Personal Communications Handbook, Artech House (May 1998) ISBN 13: 978-0890069578
-
-
-
-
14
-
-
0034450093
-
Simple forward-secure signatures from any signature scheme
-
ACM Press, New York
-
Krawczyk, H.: Simple forward-secure signatures from any signature scheme. In: ACM Conference on Computer and Communications Security, pp. 108-115. ACM Press, New York (2000)
-
(2000)
ACM Conference on Computer and Communications Security
, pp. 108-115
-
-
Krawczyk, H.1
-
16
-
-
34547635774
-
Serverless Search and Authentication Protocols for RFID
-
Los Alamitos
-
Tan, C., Sheng, B., Li, Q.: Serverless Search and Authentication Protocols for RFID. In: IEEE PerCom'2007, IEEE Computer Society Press, Los Alamitos (2007)
-
(2007)
IEEE PerCom'2007, IEEE Computer Society Press
-
-
Tan, C.1
Sheng, B.2
Li, Q.3
-
17
-
-
33746092119
-
-
Juels, A., Syverson, P., Bailey, D.: High-Power Proxies for Enhancing RFID Privacy and Utility. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, 3856, Springer, Heidelberg (2006)
-
Juels, A., Syverson, P., Bailey, D.: High-Power Proxies for Enhancing RFID Privacy and Utility. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, Springer, Heidelberg (2006)
-
-
-
-
18
-
-
21144438831
-
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
-
Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Security in Pervasive Computing Conference (SPC'03) (March 2003)
-
(2003)
Security in Pervasive Computing Conference (SPC'03) (March
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
|