-
2
-
-
50249129624
-
Generalized "yooking proofs" for a group of RFID tags
-
L. Bolotnyy and G. Robins. Generalized "yooking proofs" for a group of RFID tags. In Poster of MOBIQUITOUS06, 2006.
-
(2006)
Poster of MOBIQUITOUS06
-
-
Bolotnyy, L.1
Robins, G.2
-
3
-
-
33847330246
-
A lightweight RFID protocol to protect against traceability and cloning attacks
-
T. Dimitriou. A lightweight RFID protocol to protect against traceability and cloning attacks. In Proc. of SECURECOMM'05, 2005.
-
(2005)
Proc. of SECURECOMM'05
-
-
Dimitriou, T.1
-
4
-
-
47649126635
-
-
Class-1 Generation-2 UHF air interface protocol standard version 1.0.9: Gen 2
-
Class-1 Generation-2 UHF air interface protocol standard version 1.0.9: "Gen 2". http://www.epcglobalinc.org/standards/.
-
-
-
-
5
-
-
85011285633
-
The strict avalanche criterion: Spectral properties of boolean functions and an extended definition
-
Proc. of CRYPTO'88
-
R. Forré. The strict avalanche criterion: Spectral properties of boolean functions and an extended definition. In Proc. of CRYPTO'88, LNCS, pages 450-468, 1990.
-
(1990)
LNCS
, pp. 450-468
-
-
Forré, R.1
-
6
-
-
2942560605
-
Yoking-proofs for RFID tags
-
IEEE Computer Society, March
-
A. Juels. "Yoking-proofs" for RFID tags. In Proc. of PerSec'04, pages 138-143. IEEE Computer Society, March 2004.
-
(2004)
Proc. of PerSec'04
, pp. 138-143
-
-
Juels, A.1
-
7
-
-
30344451754
-
RFID security and privacy: A research survey
-
Manuscript
-
A. Juels. RFID security and privacy: A research survey. Manuscript, 2005.
-
(2005)
-
-
Juels, A.1
-
8
-
-
0012694899
-
Evolving a computer program to generate random number using the genetic programming paradigm
-
J.R. Koza. Evolving a computer program to generate random number using the genetic programming paradigm. In Proc. of the 4th Int. Conference on GA, pages 37-44, 1991.
-
(1991)
Proc. of the 4th Int. Conference on GA
, pp. 37-44
-
-
Koza, J.R.1
-
9
-
-
85025704284
-
Linear cryptanalysis method for DES cipher
-
M. Matsui. Linear cryptanalysis method for DES cipher. In Proc. of EUROCRYPT'93, volume 1994, pages 386-397.
-
Proc. of EUROCRYPT'93
, vol.1994
, pp. 386-397
-
-
Matsui, M.1
-
10
-
-
33750291916
-
RFID systems: A survey on security threats and proposed solutions
-
Proc. of PWC06, of
-
P. Peris-Lopez, J. C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda. RFID systems: A survey on security threats and proposed solutions. In Proc. of PWC06, volume 4217 of LNCS, pages 159-170, 2006.
-
(2006)
LNCS
, vol.4217
, pp. 159-170
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
12
-
-
47649103458
-
On existence proofs for multiple RFID tags
-
IEEE Computer Society Press
-
S. Piramuthu. On existence proofs for multiple RFID tags. In SecPerU'06. IEEE Computer Society Press, 2006.
-
(2006)
SecPerU'06
-
-
Piramuthu, S.1
-
13
-
-
33947538532
-
Protocols for RFID tag/reader authentication
-
doi:10.1016/j.dss.2007.01.003
-
S. Piramuthu. Protocols for RFID tag/reader authentication. Decision Support Systems, page doi:10.1016/j.dss.2007.01.003, 2007.
-
(2007)
Decision Support Systems, page
-
-
Piramuthu, S.1
-
14
-
-
24644501824
-
Challenge-response based RFID authentication protocol for distributed database environment
-
Proc. of SPC'05, of
-
K. Rhee, J. Kwak, S. Kim, and D. Won. Challenge-response based RFID authentication protocol for distributed database environment. In Proc. of SPC'05, volume 3450 of LNCS, pages 70-84, 2005.
-
(2005)
LNCS
, vol.3450
, pp. 70-84
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
Won, D.4
-
15
-
-
33744454961
-
Grouping proof for RFID tags
-
Taiwan, March, IEEE
-
J. Saito and Sakurai Kouichi. Grouping proof for RFID tags. In Conference on Advanced Information Networking and Applications - AINA, volume 2, pages 621-624, Taiwan, March 2005. IEEE.
-
(2005)
Conference on Advanced Information Networking and Applications - AINA
, vol.2
, pp. 621-624
-
-
Saito, J.1
Kouichi, S.2
-
16
-
-
47649116556
-
-
F.-X. Standaert, G. Piret, and J.-J. Quisquater. Cryptanalysis of block ciphers: A survey. Technical report
-
F.-X. Standaert, G. Piret, and J.-J. Quisquater. Cryptanalysis of block ciphers: A survey. Technical report.
-
-
-
-
17
-
-
0001853125
-
The computer for the 21st century
-
September
-
M. Weiser. The computer for the 21st century. Scientific American, 265(3):94-104, September 1991.
-
(1991)
Scientific American
, vol.265
, Issue.3
, pp. 94-104
-
-
Weiser, M.1
|