-
1
-
-
33745797863
-
Untraceable RFID tags via insubvertible encryption
-
ACM Press, New York
-
Ateniese, G., Camenisch, J., de Medeiros, B.: Untraceable RFID tags via insubvertible encryption. In: Proc. ACM Conf. on Computer and Communication Security (ACM CCS 2005), pp. 92-101. ACM Press, New York (2005)
-
(2005)
Proc. ACM Conf. on Computer and Communication Security (ACM CCS
, pp. 92-101
-
-
Ateniese, G.1
Camenisch, J.2
de Medeiros, B.3
-
2
-
-
45749143178
-
-
Avoine, G.: http://lasecwww.epfl.ch/∼gavoine/rfid/
-
-
-
Avoine, G.1
-
4
-
-
77952345634
-
Robust, Anonymous RFID Authentication with Constant Key-Lookup
-
ACM Press, New York
-
Burmester, M., de Medeiros, B., Motta, R.: Robust, Anonymous RFID Authentication with Constant Key-Lookup. In: Proc. ACM Symposium on Information, Computer and Communication Security (ASIACCS 2008), pp. 283-291. ACM Press, New York (2008)
-
(2008)
Proc. ACM Symposium on Information, Computer and Communication Security (ASIACCS
, pp. 283-291
-
-
Burmester, M.1
de Medeiros, B.2
Motta, R.3
-
5
-
-
50049108255
-
Provably secure ubiquitous systems: Universally composable RFID authentication protocols
-
IEEE Press, Los Alamitos
-
Burmester, M., van Le, T., de Medeiros, B.: Provably secure ubiquitous systems: Universally composable RFID authentication protocols. In: Proceedings of the 2nd IEEE/CreateNet International Conference on Security and Privacy in Communication Networks (SECURECOMM 2006). IEEE Press, Los Alamitos (2006)
-
(2006)
Proceedings of the 2nd IEEE/CreateNet International Conference on Security and Privacy in Communication Networks (SECURECOMM
-
-
Burmester, M.1
van Le, T.2
de Medeiros, B.3
-
7
-
-
0000731055
-
Security and composition of multi-party cryptographic protocols
-
Canetti, R.: Security and composition of multi-party cryptographic protocols. Journal of Cryptology 13(1), 143-202 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
8
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
IEEE Press, Los Alamitos
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: Proc. IEEE Symp. on Foundations of Computer Science (FOCS 2001), pp. 136-145. IEEE Press, Los Alamitos (2001)
-
(2001)
Proc. IEEE Symp. on Foundations of Computer Science (FOCS
, pp. 136-145
-
-
Canetti, R.1
-
9
-
-
33751546328
-
Mutual authentication protocol for rfid conforming to EPC class 1 generation 2 standards
-
Chien, H.-Y., Chen, C.-H.: Mutual authentication protocol for rfid conforming to EPC class 1 generation 2 standards. Comput. Stand. Interfaces 29(2), 254-259 (2007)
-
(2007)
Comput. Stand. Interfaces
, vol.29
, Issue.2
, pp. 254-259
-
-
Chien, H.-Y.1
Chen, C.-H.2
-
10
-
-
33751513718
-
Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning
-
Duc, D.N., Jaemin Park, H.L., Kim, K.: Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning (2006), Symposium on Cryptography and Information Security, SCIS 2006 (2006)
-
(2006)
Symposium on Cryptography and Information Security, SCIS
-
-
Duc, D.N.1
Jaemin Park, H.L.2
Kim, K.3
-
13
-
-
45749095407
-
-
EPC Global
-
EPC Global. EPC Tag Data Standards, vs. 1.3. http://www.epcglobalinc. org/standards/EPCglobal_Tag_Data_Standard_TDS_Version_1.3.pdf
-
EPC Tag Data Standards, vs. 1.3
-
-
-
14
-
-
0022793132
-
How to construct pseudorandom functions
-
Goldreich, O., Goldwasser, S., Micali, S.: How to construct pseudorandom functions. Journal of the ACM 33(4) (1986)
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
15
-
-
2942625823
-
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
-
Henrici, D., Müller, P.M.: Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: Proc. IEEE Intern. Conf. on Pervasive Computing and Communications, pp. 149-153 (2004)
-
(2004)
Proc. IEEE Intern. Conf. on Pervasive Computing and Communications
, pp. 149-153
-
-
Henrici, D.1
Müller, P.M.2
-
16
-
-
45749112967
-
-
ISO/IEC. Standard # 18000 - RFID Air Interface Standard, http://www.hightechaid.com/standards/18000.htm
-
ISO/IEC. Standard # 18000 - RFID Air Interface Standard, http://www.hightechaid.com/standards/18000.htm
-
-
-
-
17
-
-
23944476196
-
-
Juels, A.: Minimalist cryptography for low-cost RFID tags. In: Blundo, C, Cimato, S. (eds.) SCN 2004. LNCS, 3352, pp. 149-164. Springer, Heidelberg (2005)
-
Juels, A.: Minimalist cryptography for low-cost RFID tags. In: Blundo, C, Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 149-164. Springer, Heidelberg (2005)
-
-
-
-
18
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.1
van Oorschot, P.2
Vanstone, S.3
-
19
-
-
33745597876
-
-
Molnar, D., Soppera, A., Wagner, D.: A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, 3897, Springer, Heidelberg (2006)
-
Molnar, D., Soppera, A., Wagner, D.: A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, Springer, Heidelberg (2006)
-
-
-
-
21
-
-
35248872610
-
-
Sharma, S.E., Weiss, S.A., Engels, D.W.: RFID systems and security and privacy implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, 2523, pp. 454-469. Springer, Heidelberg (2003)
-
Sharma, S.E., Weiss, S.A., Engels, D.W.: RFID systems and security and privacy implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454-469. Springer, Heidelberg (2003)
-
-
-
-
24
-
-
34748848124
-
Universally composable and forward-secure RFID authentication and authenticated key exchange
-
ACM Press, New York
-
van Le, T., Burmester, M., de Medeiros, B.: Universally composable and forward-secure RFID authentication and authenticated key exchange. In: Proc. of the ACM Symp. on Information, Computer, and Communications Security (ASIACCS 2007), pp. 242-252. ACM Press, New York (2007)
-
(2007)
Proc. of the ACM Symp. on Information, Computer, and Communications Security (ASIACCS
, pp. 242-252
-
-
van Le, T.1
Burmester, M.2
de Medeiros, B.3
-
25
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Hutter, D, Müller, G, Stephan, W, Ullmann, M, eds, Security in Pervasive Computing, Springer, Heidelberg
-
Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 454-469. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2802
, pp. 454-469
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
|