-
1
-
-
35048876270
-
Security and privacy aspects of lowcost radio frequency identification systems
-
Hutter, D, Müller, G, Stephan, W, Ullmann, M, eds, Security in Pervasive Computing, Springer, Heidelberg
-
Weis, S.A., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of lowcost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201-212. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
2
-
-
35248832722
-
-
Juels, A., Pappu, R.: Squealing Euros: Privacy protection in RFID-enabled banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, 2742, pp. 103-121. Springer, Heidelberg (2003)
-
Juels, A., Pappu, R.: Squealing Euros: Privacy protection in RFID-enabled banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 103-121. Springer, Heidelberg (2003)
-
-
-
-
3
-
-
38349023567
-
-
Molnar, D., Soppera, A., Wagner, D.: A scalable delegatable pseudonym protocol enabling ownership transfer of RFID tags, In: Preneel, B., Tavares, S. (eds.) Selected Areas in Cryptography-SAC 2005. LNCS, Springer, Heidelberg (2005)
-
Molnar, D., Soppera, A., Wagner, D.: A scalable delegatable pseudonym protocol enabling ownership transfer of RFID tags, In: Preneel, B., Tavares, S. (eds.) Selected Areas in Cryptography-SAC 2005. LNCS, Springer, Heidelberg (2005)
-
-
-
-
4
-
-
2942625823
-
Hash-based Enhancement of Location Privacy for RadioFrequency Identification Devices using Varying Identifiers
-
IEEE Computer Society Press, Los Alamitos
-
Henrici, D., Muller, P.: Hash-based Enhancement of Location Privacy for RadioFrequency Identification Devices using Varying Identifiers. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshop, PERCOMW '04, pp. 149-153. IEEE Computer Society Press, Los Alamitos (2004)
-
(2004)
Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshop, PERCOMW '04
, pp. 149-153
-
-
Henrici, D.1
Muller, P.2
-
8
-
-
18744409344
-
-
Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 103-111 (2003)
-
Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 103-111 (2003)
-
-
-
-
9
-
-
35048899238
-
-
Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal re-encryption for mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, 2964, pp. 163-178. Springer, Heidelberg (2004)
-
Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal re-encryption for mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163-178. Springer, Heidelberg (2004)
-
-
-
-
10
-
-
23944476196
-
-
Juels, A.: Minimalist cryptography for low-cost RFID tags. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, 3352, pp. 149-164. Springer, Heidelberg (2005)
-
Juels, A.: Minimalist cryptography for low-cost RFID tags. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 149-164. Springer, Heidelberg (2005)
-
-
-
-
11
-
-
33744940544
-
Efficient RFID Authentication protocol for Ubiquitous Computing Environment
-
Enokido, T, Yan, L, Xiao, B, Kim, D, Dai, Y, Yang, L.T, eds, International Workshop on Security in Ubiquitous Computing Systems, secubiq, Springer, Heidelberg
-
Choi, E.Y., Lee, S.M., Lee, D.H.: Efficient RFID Authentication protocol for Ubiquitous Computing Environment. In: Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y., Yang, L.T. (eds.) International Workshop on Security in Ubiquitous Computing Systems - secubiq 2005. LNCS, vol. 3823, pp. 945-954. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3823
, pp. 945-954
-
-
Choi, E.Y.1
Lee, S.M.2
Lee, D.H.3
-
12
-
-
33845531085
-
Radio frequency identification: Adversary model and attacks on existing protocols
-
Technical Report LASEC-REPORT-2005-001, EPFL, Lausanne, Switzerland September
-
Avoine, G.: Radio frequency identification: adversary model and attacks on existing protocols, Technical Report LASEC-REPORT-2005-001, EPFL, Lausanne, Switzerland (September 2005)
-
(2005)
-
-
Avoine, G.1
|