-
1
-
-
33747067321
-
-
Jul 2000
-
A. Berthon "Security in RFID": http://www.nepc.sanc.org.sg/ html/techreport/N327.doc, Jul 2000.
-
Security in RFID
-
-
Berthon, A.1
-
2
-
-
20844459862
-
RFID privacy: An overview of problems and proposed solutions
-
May-June
-
S. L. Garfinkel, A. Juels and R. Pappu, "RFID privacy: An overview of problems and proposed solutions", IEEE Security & privacy, May-June 2005, pp. 34-43.
-
(2005)
IEEE Security & privacy
, pp. 34-43
-
-
Garfinkel, S.L.1
Juels, A.2
Pappu, R.3
-
3
-
-
35048876270
-
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
-
Proceedings of the Security in Pervasive Computing 2003 conference
-
S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", in Proceedings of the Security in Pervasive Computing 2003 conference, LNCS 2802, pp. 201-212.
-
LNCS
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
4
-
-
33645857377
-
Cryptography and authentication on RFID passive tags for apparel products
-
K. H. M. Wong, P. C. L. Hui and A. C. K. Chan, "Cryptography and authentication on RFID passive tags for apparel products", Computers in industry, vol. 57, no.4, 2006, pp. 342-349.
-
(2006)
Computers in industry
, vol.57
, Issue.4
, pp. 342-349
-
-
Wong, K.H.M.1
Hui, P.C.L.2
Chan, A.C.K.3
-
5
-
-
35048859848
-
Strong Authentication for RFID Systems Using the AES Algorithm
-
proceedings of the CHES-2004
-
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, "Strong Authentication for RFID Systems Using the AES Algorithm", in proceedings of the CHES-2004, LNCS vol. 3156, 2004, pp. 357-370.
-
(2004)
LNCS
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
7
-
-
26444478592
-
RFID Traceability: A Multilayer Problem
-
proceedings of the Financial Cryptography-2005
-
G. Avoine and P. Oechslin. "RFID Traceability: A Multilayer Problem", in proceedings of the Financial Cryptography-2005. LNCS vol 3570, 2005, pp 125-140.
-
(2005)
LNCS
, vol.3570
, pp. 125-140
-
-
Avoine, G.1
Oechslin, P.2
-
8
-
-
24944582157
-
Efficient Authentication for Low-cost RFID Systems
-
proceedings of the ICCSA
-
S. M. Lee, Y. J. Hwang, D. H. Lee and J. I. Lim, "Efficient Authentication for Low-cost RFID Systems", in proceedings of the ICCSA 2005, LNCS vol. 3480, 2005, pp. 619-627.
-
(2005)
LNCS
, vol.3480
, pp. 619-627
-
-
Lee, S.M.1
Hwang, Y.J.2
Lee, D.H.3
Lim, J.I.4
-
9
-
-
33747058795
-
Security implications in RFID and authentication processing frame work
-
J. Ayode, "Security implications in RFID and authentication processing frame work", Comp & Sec, Vol. 25, 2006, pp.207-212
-
(2006)
Comp & Sec
, vol.25
, pp. 207-212
-
-
Ayode, J.1
-
10
-
-
0003818882
-
Additive Cellular Automata: Theory and Applications
-
P. Pal Chaudhuri, D. R. Chowdhury, S. Nandi and S. Chattopadhyay, Additive Cellular Automata: Theory and Applications, Wiley-IEEE Computer Society Press, vol. 1, 1997.
-
(1997)
Wiley-IEEE Computer Society Press
, vol.1
-
-
Pal Chaudhuri, P.1
Chowdhury, D.R.2
Nandi, S.3
Chattopadhyay, S.4
-
12
-
-
2942623480
-
RFID Systems, Security and Privacy Implications
-
Auto-ID Labs
-
S. A. Sarma, S. A. Weis and D. W. Engels,"RFID Systems, Security and Privacy Implications." Whitepaper, Auto-ID Labs, www.autoidlabs.org/ whitepapers/MIT-AUTOID-WH-014.pdf.
-
Whitepaper
-
-
Sarma, S.A.1
Weis, S.A.2
Engels, D.W.3
|