-
1
-
-
2942560605
-
-
A. Juels, Yoking-Proofs for RFID tags, in: Proceedings of IEEE International Conference Digital Object Identifier, 2004, pp. 138-143.
-
A. Juels, Yoking-Proofs for RFID tags, in: Proceedings of IEEE International Conference Digital Object Identifier, 2004, pp. 138-143.
-
-
-
-
2
-
-
46749152684
-
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
-
Chien H.Y., and Chen C.H. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards. Computer Standards & Interfaces (2006)
-
(2006)
Computer Standards & Interfaces
-
-
Chien, H.Y.1
Chen, C.H.2
-
3
-
-
33645857377
-
Cryptography and authentication on RFID passive tags for apparel products
-
Wong K.H.M., Hui P.C.L., and Chan A.C.K. Cryptography and authentication on RFID passive tags for apparel products. Computer in Industry 57 (2005) 342-349
-
(2005)
Computer in Industry
, vol.57
, pp. 342-349
-
-
Wong, K.H.M.1
Hui, P.C.L.2
Chan, A.C.K.3
-
4
-
-
46749115236
-
-
S. Sarma, S. Weis, D. Engels, RFID system, security and privacy implications, in: White Paper, MIT Auto-ID Center, November 2002.
-
S. Sarma, S. Weis, D. Engels, RFID system, security and privacy implications, in: White Paper, MIT Auto-ID Center, November 2002.
-
-
-
-
5
-
-
35048876270
-
-
S.A. Weis, S.E. Sarma, R.L. Rivest, D.W. Engels, Security and privacy aspects of low-cost radio frequency identification systems, in: Security in Pervasive Computing 2003. LNCS no. 2802, 2004, pp. 201-212.
-
S.A. Weis, S.E. Sarma, R.L. Rivest, D.W. Engels, Security and privacy aspects of low-cost radio frequency identification systems, in: Security in Pervasive Computing 2003. LNCS no. 2802, 2004, pp. 201-212.
-
-
-
-
6
-
-
46749153105
-
-
EPCglobal web site, .
-
EPCglobal web site, .
-
-
-
-
7
-
-
46749086750
-
-
D.N. Duc, J. Park, H. Lee, K. Kim, Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning, in: The 2006 Symposium on Cryptography and Information Security, 2006.
-
D.N. Duc, J. Park, H. Lee, K. Kim, Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning, in: The 2006 Symposium on Cryptography and Information Security, 2006.
-
-
-
-
8
-
-
2942625823
-
-
A.D. Henrici, P. Mauller, Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers, in: IEEE PerCom, 2004, pp. 149-153.
-
A.D. Henrici, P. Mauller, Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers, in: IEEE PerCom, 2004, pp. 149-153.
-
-
-
-
9
-
-
33745938362
-
-
S. Karthikeyan, M. Nesterenko, RFID security without extensive cryptography, in: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2005, pp. 63-67.
-
S. Karthikeyan, M. Nesterenko, RFID security without extensive cryptography, in: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2005, pp. 63-67.
-
-
-
-
10
-
-
14844294769
-
-
D. Molnar, D. Wagner, Privacy and security in library RFID: issues, practices, and architectures, in: Conference on Computer and Communications Security CCS'04, 2004, pp. 210-219.
-
D. Molnar, D. Wagner, Privacy and security in library RFID: issues, practices, and architectures, in: Conference on Computer and Communications Security CCS'04, 2004, pp. 210-219.
-
-
-
-
11
-
-
46749113131
-
-
M. Ohkubo, K. Suzki, S. Kinoshita, Cryptographic approach to privacy-friendly tags, in: RFID Privacy Workshop, 2003.
-
M. Ohkubo, K. Suzki, S. Kinoshita, Cryptographic approach to privacy-friendly tags, in: RFID Privacy Workshop, 2003.
-
-
-
-
12
-
-
24644501824
-
-
K. Rhee, J. Kwak, S. Kim, D. Won, Challenge-response based RFID authentication protocol for distributed database environment, in: International Conference on Security in Pervasive Computing SPC 2005, pp. 70-84.
-
K. Rhee, J. Kwak, S. Kim, D. Won, Challenge-response based RFID authentication protocol for distributed database environment, in: International Conference on Security in Pervasive Computing SPC 2005, pp. 70-84.
-
-
-
-
13
-
-
46749155167
-
-
J. Yang, J. Park, H. Lee, K. Ren, K. Kim, Mutual authentication protocol for low-cost RFID, in: Handout of the Encrypt Workshop on RFID and Lightweight Crypto, 2005.
-
J. Yang, J. Park, H. Lee, K. Ren, K. Kim, Mutual authentication protocol for low-cost RFID, in: Handout of the Encrypt Workshop on RFID and Lightweight Crypto, 2005.
-
-
-
-
14
-
-
46749131966
-
-
J. Yang, K. Ren, K. Kim, Security and privacy on authentication protocol for low-cost radio, in: The 2005 Symposium on Cryptography and Information Security.
-
J. Yang, K. Ren, K. Kim, Security and privacy on authentication protocol for low-cost radio, in: The 2005 Symposium on Cryptography and Information Security.
-
-
-
-
16
-
-
46749121517
-
-
W. Patterson, Mathematical Cryptology for Computer Scientists and Mathematicians, Rowman, 1987.
-
W. Patterson, Mathematical Cryptology for Computer Scientists and Mathematicians, Rowman, 1987.
-
-
-
-
17
-
-
14544276998
-
-
E. Thompson, MD5 collisions and the impact on computer forensics, in: Digital Investigation 2005, pp. 36-40.
-
E. Thompson, MD5 collisions and the impact on computer forensics, in: Digital Investigation 2005, pp. 36-40.
-
-
-
-
18
-
-
46749145046
-
-
A. Shamir, Squash: A new one-way hash function with provable security properties for highly constrained devices such as RFID tags, in: Invited Talk, International Conference on RFID Security (RFIDSec'07), 2007.
-
A. Shamir, Squash: A new one-way hash function with provable security properties for highly constrained devices such as RFID tags, in: Invited Talk, International Conference on RFID Security (RFIDSec'07), 2007.
-
-
-
-
19
-
-
46749128639
-
-
M. Burmester, B. Medeiros, R. Motta, Robust, Anonymous RFID Authentication with Constant Key-Lookup," , 2007.
-
M. Burmester, B. Medeiros, R. Motta, Robust, Anonymous RFID Authentication with Constant Key-Lookup," , 2007.
-
-
-
-
20
-
-
33750067948
-
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, A. Rib-agorda, M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags, in: Proceedings of International Conference on Ubiquitous Intelligence and Computing UIC'06, LNCS 4195, Springer-Verlag, 2006, pp. 912-923.
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, A. Rib-agorda, M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags, in: Proceedings of International Conference on Ubiquitous Intelligence and Computing UIC'06, LNCS 4195, Springer-Verlag, 2006, pp. 912-923.
-
-
-
-
21
-
-
46749145440
-
-
G. Avoine, E. Dysli, P. Oechslin, Reducing time complexity in RFID systems, in: The 12th Annual Workshop on Selected Areas in Cryptography (SAC), 2005.
-
G. Avoine, E. Dysli, P. Oechslin, Reducing time complexity in RFID systems, in: The 12th Annual Workshop on Selected Areas in Cryptography (SAC), 2005.
-
-
-
|