-
3
-
-
84873466407
-
Authenticated Key Exchange Secure against Dictionary Attacks
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS. vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
4
-
-
41549103803
-
-
Burmester, M., Le, T.V., de Medeiros. B.: Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols. In: Proceedings of Securecomm 2006, pp. 1-9 (last revised December 5, 2006), full version available at IACR ePrint Archive, http://eprint.iacr.org/2006/448
-
Burmester, M., Le, T.V., de Medeiros. B.: Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols. In: Proceedings of Securecomm 2006, pp. 1-9 (last revised December 5, 2006), full version available at IACR ePrint Archive, http://eprint.iacr.org/2006/448
-
-
-
-
5
-
-
0035163054
-
-
Canetti, R.: Universally Composable Security: A New Paradigm for Cryptographic Protocols. In: Proc. IEEE FOCS 2001, pp. 136-145 (2001), (last revised December 13, 2005), full version available at IACR ePrint Archive. http ://eprint.iacr.org/2000/067
-
Canetti, R.: Universally Composable Security: A New Paradigm for Cryptographic Protocols. In: Proc. IEEE FOCS 2001, pp. 136-145 (2001), (last revised December 13, 2005), full version available at IACR ePrint Archive. http ://eprint.iacr.org/2000/067
-
-
-
-
6
-
-
38049173955
-
-
Carluccio, D., Lemke, K., Paar, C.: E-Passport: The Global Traceability or How to Feel Like a UPS Package. In: Lee, J.K., Yi, O., Yung, M. (eds.) WISA 2006. LNCS, 4298, pp. 391-404. Springer, Heidelberg (2007)
-
Carluccio, D., Lemke, K., Paar, C.: E-Passport: The Global Traceability or How to Feel Like a UPS Package. In: Lee, J.K., Yi, O., Yung, M. (eds.) WISA 2006. LNCS, vol. 4298, pp. 391-404. Springer, Heidelberg (2007)
-
-
-
-
7
-
-
41549132674
-
-
CASPIAN, Boycott Benetton (accessed September 19, 2007), http ://www.boycottbenetton.com
-
CASPIAN, Boycott Benetton (accessed September 19, 2007), http ://www.boycottbenetton.com
-
-
-
-
8
-
-
41549098759
-
Secret Shuffling: A Novel Approach to RFID Private Identification
-
Castelluccia, C., Soos, M.: Secret Shuffling: A Novel Approach to RFID Private Identification. In: Proceedings of RFIDSec 2007, pp. 169-180 (2007)
-
(2007)
Proceedings of RFIDSec
, pp. 169-180
-
-
Castelluccia, C.1
Soos, M.2
-
9
-
-
34547672707
-
RIPP-FS: An RFID Identification. Privacy Preserving Protocol with Forward Secrecy
-
Conti, M., Di Petro, R., Mancini, L.V., Spognardi, A.: RIPP-FS: An RFID Identification. Privacy Preserving Protocol with Forward Secrecy. In: Proceedings of PerCom 2007, pp. 229-234 (2007)
-
(2007)
Proceedings of PerCom
, pp. 229-234
-
-
Conti, M.1
Di Petro, R.2
Mancini, L.V.3
Spognardi, A.4
-
10
-
-
41549156513
-
-
Heydt-Benjamin, T.S., Bailey, D.V., Fu, K., Juels, A., O'Hare, T.: Vulnerabilities in First-Generation RFID-enabled Credit Cards. In: FC 2007. LNCS. 4535. Springer, Heidelberg (2008)
-
Heydt-Benjamin, T.S., Bailey, D.V., Fu, K., Juels, A., O'Hare, T.: Vulnerabilities in First-Generation RFID-enabled Credit Cards. In: FC 2007. LNCS. vol. 4535. Springer, Heidelberg (2008)
-
-
-
-
11
-
-
33845240394
-
-
Hoepman. J.-H., Hubbers, E., Jacobs, B., Oostdijk, M., Schreur, R.W.: Crossing Borders: Security and Privacy Issues of the European e-Passport. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, 4266, pp. 152-167. Springer. Heidelberg (2006)
-
Hoepman. J.-H., Hubbers, E., Jacobs, B., Oostdijk, M., Schreur, R.W.: Crossing Borders: Security and Privacy Issues of the European e-Passport. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, vol. 4266, pp. 152-167. Springer. Heidelberg (2006)
-
-
-
-
12
-
-
33847249519
-
-
Juels, A., Molnar, D., Wagner, D.: Security and Privacy Issues in E-Passports. In: Proceedings of SecureComm 2005, pp. 74-88 (2005) (last revised September 18. 2007). full version available at IACR ePrint Archive, http ://eprint.iacr.org/2005/095
-
Juels, A., Molnar, D., Wagner, D.: Security and Privacy Issues in E-Passports. In: Proceedings of SecureComm 2005, pp. 74-88 (2005) (last revised September 18. 2007). full version available at IACR ePrint Archive, http ://eprint.iacr.org/2005/095
-
-
-
-
13
-
-
34547687590
-
Defining Strong Privacy for RFID
-
April 7, 2006
-
Juels, A., Weis, S.A.: Defining Strong Privacy for RFID. In: Proceedings of PerCom 2007, pp. 342-347 (2007) (April 7, 2006), http://eprint.iacr.org/2006/ 137
-
(2007)
Proceedings of PerCom
, pp. 342-347
-
-
Juels, A.1
Weis, S.A.2
-
14
-
-
33745803207
-
-
Kim, S.-C., Yeo, S.-S., Kim, S.K.: MARP: Mobile Agent for RFID Privacy Protection. In: Domingo-Ferrer, J.. Posegga, J., Schreckling. D. (eds.) CARDIS 2006. LNCS. 3928, pp. 300-312. Springer, Heidelberg (2006)
-
Kim, S.-C., Yeo, S.-S., Kim, S.K.: MARP: Mobile Agent for RFID Privacy Protection. In: Domingo-Ferrer, J.. Posegga, J., Schreckling. D. (eds.) CARDIS 2006. LNCS. vol. 3928, pp. 300-312. Springer, Heidelberg (2006)
-
-
-
-
15
-
-
36349031223
-
An Analysis of Security and Privacy Issues Relating to RFID Enabled ePassports
-
Venter, H, Eloff, M, Labuschagne, L, Eloff, J, von Solms, R, eds, Springer. Boston to appear
-
Kosta, E., Meints, M., Hansen, M., Gasson, M.: An Analysis of Security and Privacy Issues Relating to RFID Enabled ePassports. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) IFIP International Federation for Information Processing, New Approaches for Security, Privacy and Trust in Complex Environments, vol. 232, pp. 467-472. Springer. Boston (to appear. 2007)
-
(2007)
IFIP International Federation for Information Processing, New Approaches for Security, Privacy and Trust in Complex Environments
, vol.232
, pp. 467-472
-
-
Kosta, E.1
Meints, M.2
Hansen, M.3
Gasson, M.4
-
16
-
-
34748848124
-
Universally Composable and Forward-Secure RFID Authentication and Authenticated Key Exchange
-
February 14, 2007
-
Le, T.V., Burmester, M., de Medeiros, B.: Universally Composable and Forward-Secure RFID Authentication and Authenticated Key Exchange. In: Proceedings of ASIACCS 2007, pp. 242-252 (2007) (February 14, 2007), http://eprint.iacr.org/2007/051
-
(2007)
Proceedings of ASIACCS
, pp. 242-252
-
-
Le, T.V.1
Burmester, M.2
de Medeiros, B.3
-
17
-
-
84977783611
-
Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer
-
Ning, P, Qing, S, Li, N, eds, ICICS 2006, Springer. Heidelberg
-
Lim, C.H., Kwon, T.: Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 1-20. Springer. Heidelberg (2006)
-
(2006)
LNCS
, vol.4307
, pp. 1-20
-
-
Lim, C.H.1
Kwon, T.2
-
20
-
-
41549168688
-
About Machine-Readable Travel Documents: Privacy Enhancement using (Weakly) Non-Transferable Data Authentication
-
Monnerat, J., Vaudenay, S., Vuagnoux, M.: About Machine-Readable Travel Documents: Privacy Enhancement using (Weakly) Non-Transferable Data Authentication. In: Proceedings of RFIDSec 2007. pp. 15-28 (2007)
-
(2007)
Proceedings of RFIDSec
, pp. 15-28
-
-
Monnerat, J.1
Vaudenay, S.2
Vuagnoux, M.3
-
21
-
-
25444432606
-
RFID Privacy Issues and Technical Challenges
-
Ohkubo, M., Suzuki, K., Kinoshita, S.: RFID Privacy Issues and Technical Challenges. Communications of the ACM 48(9), 66-71 (2005)
-
(2005)
Communications of the ACM
, vol.48
, Issue.9
, pp. 66-71
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
22
-
-
70349118926
-
Mutual Authentication in RFID: Security and Privacy
-
to appear
-
Paise, R.-I., Vaudenay, S.: Mutual Authentication in RFID: Security and Privacy. In: Proceedings of AsiaCCS (2008) (to appear)
-
(2008)
Proceedings of AsiaCCS
-
-
Paise, R.-I.1
Vaudenay, S.2
-
23
-
-
35048852068
-
-
Rogaway, P.: On the Role Definitions in and Beyond Cryptography. In: Maher. M.J. (ed.) ASIAN 2004. LNCS, 3321, pp. 13-32. Springer, Heidelberg (2004)
-
Rogaway, P.: On the Role Definitions in and Beyond Cryptography. In: Maher. M.J. (ed.) ASIAN 2004. LNCS, vol. 3321, pp. 13-32. Springer, Heidelberg (2004)
-
-
-
-
24
-
-
34547635774
-
Serverless Search and Authentication Protocols for RFID
-
Tan, C.C., Sheng, B., Li, Q.: Serverless Search and Authentication Protocols for RFID. In: Proceedings of PerCom 2007, pp. 3-12 (2007)
-
(2007)
Proceedings of PerCom
, pp. 3-12
-
-
Tan, C.C.1
Sheng, B.2
Li, Q.3
-
26
-
-
33750290259
-
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
-
Tsudik, G.: YA-TRAP: Yet Another Trivial RFID Authentication Protocol. In: Proceedings of PerCom 2006. pp. 640-643 (2006)
-
(2006)
Proceedings of PerCom
, pp. 640-643
-
-
Tsudik, G.1
-
27
-
-
34547414125
-
RPID Privacy based on Public-Key Cryptography
-
Rhee, M.S, Lee, B, eds, ICISC 2006, Springer, Heidelberg
-
Vaudenay, S.: RPID Privacy based on Public-Key Cryptography. In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol. 4296, pp. 1-6. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4296
, pp. 1-6
-
-
Vaudenay, S.1
-
28
-
-
38149038702
-
On Privacy Models for RFID
-
Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
-
Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68-87. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 68-87
-
-
Vaudenay, S.1
|