-
1
-
-
33745621564
-
Reducing Time Complexity in RFID Systems
-
Preneel, B, Tavares, S, eds, Selected Areas in Cryptography, Springer, Heidelberg
-
Avoine, G., Dysli, E., Oechslin, P.: Reducing Time Complexity in RFID Systems. In: Preneel, B., Tavares, S. (eds.) Selected Areas in Cryptography. LNCS, vol. 3897, pp. 291-306. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3897
, pp. 291-306
-
-
Avoine, G.1
Dysli, E.2
Oechslin, P.3
-
2
-
-
33745926180
-
New Security Problem in RFID Systems Tag Killing
-
Gavrilova, M, Gervasi, O, Kumar, V, Tan, C.J.K, Taniar, D, Laganà, A, Mun, Y, Choo, H, eds, Computational Science and Its Applications, ICCSA 2006, Springer, Heidelberg
-
Han, D.G., Takagi, T., Kim, H.W., Chung, K.I.: New Security Problem in RFID Systems Tag Killing. In: Gavrilova, M., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganà, A., Mun, Y., Choo, H. (eds.) Computational Science and Its Applications - ICCSA 2006. LNCS, vol. 3982, pp. 375-384. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3982
, pp. 375-384
-
-
Han, D.G.1
Takagi, T.2
Kim, H.W.3
Chung, K.I.4
-
3
-
-
25444508507
-
Low-cost RFID Privacy Protection Scheme
-
In Japanese
-
Kinoshita, S., Hoshino, F., Komuro, T., Fujimura, A., Ohkubo, M.: Low-cost RFID Privacy Protection Scheme. IPSJ Journal 45(8), 2007-2021 (2004) (In Japanese)
-
(2004)
IPSJ Journal
, vol.45
, Issue.8
, pp. 2007-2021
-
-
Kinoshita, S.1
Hoshino, F.2
Komuro, T.3
Fujimura, A.4
Ohkubo, M.5
-
4
-
-
24944575863
-
Cryptographic Approach to Privacy Friendly Tags
-
MIT, Cambridge, MA
-
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to Privacy Friendly Tags. In: RFID Privacy Workshop, MIT, Cambridge, MA (2003)
-
(2003)
RFID Privacy Workshop
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
5
-
-
24644501824
-
Challenge-Response based RFID Authentication Protocol for Distributed Database Environment
-
Hutter, D, Ullmann, M, eds, Security in Pervasive Computing, Springer, Heidelberg
-
Rhee, K., Kwak, J., Kim, S., Won, D.: Challenge-Response based RFID Authentication Protocol for Distributed Database Environment. In: Hutter, D., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 3450, pp. 70-84. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3450
, pp. 70-84
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
Won, D.4
-
6
-
-
33744928896
-
-
Saito, J., Imamoto, K., Sakurai, K.: Reassignment Scheme of an RFID Tag's Key for Owner Transfer. In: Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y., Yang, L.T. (eds.) Embedded and Ubiquitous Computing - EUC 2005 Workshops. LNCS, 3823, pp. 1303-1312. Springer, Heidelberg (2005)
-
Saito, J., Imamoto, K., Sakurai, K.: Reassignment Scheme of an RFID Tag's Key for Owner Transfer. In: Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y., Yang, L.T. (eds.) Embedded and Ubiquitous Computing - EUC 2005 Workshops. LNCS, vol. 3823, pp. 1303-1312. Springer, Heidelberg (2005)
-
-
-
-
7
-
-
35048876270
-
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
-
Hutter, D, Müller, G, Stephan, W, Ullmann, M, eds, Security in Pervasive Computing, Springer, Heidelberg
-
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201-212. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
8
-
-
33745757995
-
RFID: Authentication Protocol with Strong Resistance against Traceability and Denial of Service Attacks
-
Molva, R, Tsudik, G, Westhoff, D, eds, Security and Privacy in Ad-hoc and Sensor Networks, Springer, Heidelberg
-
Kang, J., Nyang, D.: RFID: Authentication Protocol with Strong Resistance against Traceability and Denial of Service Attacks. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) Security and Privacy in Ad-hoc and Sensor Networks. LNCS, vol. 3813, pp. 164-175. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3813
, pp. 164-175
-
-
Kang, J.1
Nyang, D.2
-
9
-
-
14844294769
-
Privacy and Security in Library RFID: Issues, Practices, and Architectures
-
ACM Press, New York
-
Molnar, D., Wagner, D.: Privacy and Security in Library RFID: Issues, Practices, and Architectures. In: ACM CCS, pp. 210-219. ACM Press, New York (2004)
-
(2004)
ACM CCS
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
10
-
-
2942625823
-
-
Henrici, D., Müller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. In: Henrici, D., Müller, P. (eds.) PerSec 2004, pp. 149-153. IEEE Computer Society, New York (2004)
-
Henrici, D., Müller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. In: Henrici, D., Müller, P. (eds.) PerSec 2004, pp. 149-153. IEEE Computer Society, New York (2004)
-
-
-
|