-
2
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Hutter, D, Müller, G, Stephan, W, Ulimann, M, eds, Security in Pervasive Computing, Springer, Heidelberg
-
Weis, S.A., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ulimann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201-212. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
3
-
-
35248832722
-
Squealing Euros: Privacy protection in RFID-enabled banknotes
-
Wright, R.N, ed, Financial Cryptography, Springer, Heidelberg
-
Juels, A., Pappu, R.: Squealing Euros: Privacy protection in RFID-enabled banknotes. In: Wright, R.N. (ed.) Financial Cryptography. LNCS, vol. 2742, pp. 103-121. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2742
, pp. 103-121
-
-
Juels, A.1
Pappu, R.2
-
4
-
-
38349068992
-
-
Molnar, D., Soppera, A., Wagner, D.: A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In: Preneel, B., Tavares, S. (eds.) Selected Areas in Cryptography-SAC 2005. LNCS, Springer, Heidelberg (2005)
-
Molnar, D., Soppera, A., Wagner, D.: A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In: Preneel, B., Tavares, S. (eds.) Selected Areas in Cryptography-SAC 2005. LNCS, Springer, Heidelberg (2005)
-
-
-
-
5
-
-
2942625823
-
Hash-based Enhancement of Location Privacy for RadioFrequency Identification Devices using Varying Identifiers
-
IEEE, New York
-
Henrici, D., Muller, P.: Hash-based Enhancement of Location Privacy for RadioFrequency Identification Devices using Varying Identifiers. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshop, PERCOMW '04, pp. 149-153. IEEE, New York (2004)
-
(2004)
Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshop, PERCOMW '04
, pp. 149-153
-
-
Henrici, D.1
Muller, P.2
-
8
-
-
18744409344
-
-
Juels, A., Rivest, R. L. Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy, 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 103-111 (2003)
-
Juels, A., Rivest, R. L. Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy, 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 103-111 (2003)
-
-
-
-
9
-
-
35048899238
-
-
Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal re-encryption for mixnets. In: Okamoto, T. (ed.) Topics in Cryptology - CT-RSA 2004. LNCS, 2964, pp. 163-178. Springer, Heidelberg (2004)
-
Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal re-encryption for mixnets. In: Okamoto, T. (ed.) Topics in Cryptology - CT-RSA 2004. LNCS, vol. 2964, pp. 163-178. Springer, Heidelberg (2004)
-
-
-
-
10
-
-
23944476196
-
Minimalist cryptography for low-cost RFID tags
-
Blundo, C, Cimato, S, eds, Security in Communication Networks, Springer, Heidelberg
-
Juels, A.: Minimalist cryptography for low-cost RFID tags. In: Blundo, C., Cimato, S. (eds.) Security in Communication Networks. LNCS, vol. 3352, pp. 149-164. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3352
, pp. 149-164
-
-
Juels, A.1
-
11
-
-
33744940544
-
-
Choi, E.Y., Lee, S.M., Lee, D.H.: Efficient RFID Authentication protocol for Ubiquitous Computing Environment. In: Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y., Yang, L.T. (eds.) Embedded and Ubiquitous Computing - EUC 2005 Workshops, LNCS, 3823, pp. 945-954. Springer, Heidelberg (2005)
-
Choi, E.Y., Lee, S.M., Lee, D.H.: Efficient RFID Authentication protocol for Ubiquitous Computing Environment. In: Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y., Yang, L.T. (eds.) Embedded and Ubiquitous Computing - EUC 2005 Workshops, LNCS, vol. 3823, pp. 945-954. Springer, Heidelberg (2005)
-
-
-
|