-
1
-
-
33646943487
-
Security and Privacy in RFID and Applications in Telemedicine
-
Apr
-
Y. Xiao, X. Shen, B. Sun, and L. Cai, "Security and Privacy in RFID and Applications in Telemedicine", IEEE Comm. Mag., Apr., 2006, pp. 64-72.
-
(2006)
IEEE Comm. Mag
, pp. 64-72
-
-
Xiao, Y.1
Shen, X.2
Sun, B.3
Cai, L.4
-
2
-
-
18744409344
-
The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy
-
Washington D.C
-
A. Juels, R. Rivest, and M. Szydlo, "The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy", ACM CCS'03, Washington D.C., 2003, pp. 103-111.
-
(2003)
ACM CCS'03
, pp. 103-111
-
-
Juels, A.1
Rivest, R.2
Szydlo, M.3
-
4
-
-
14844294769
-
Privacy and Security in Library RFID Issues, Practices, and Architectures
-
Washington DC
-
D. Molnar, and D. Wagner, "Privacy and Security in Library RFID Issues, Practices, and Architectures", ACM CCS'04, Washington DC, 2004, pp. 210-219.
-
(2004)
ACM CCS'04
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
5
-
-
34547340397
-
A Lightweight Secure Protocol for Wireless Sensor Networks
-
B. Sun, C.-C Li, K. Wu, and Y. Xiao, "A Lightweight Secure Protocol for Wireless Sensor Networks", Elsevier Computer Communications journal special issue on Wireless Sensor Networks: Performance, Reliability, Security, and Beyond, 2005.
-
(2005)
Elsevier Computer Communications journal special issue on Wireless Sensor Networks: Performance, Reliability, Security, and Beyond
-
-
Sun, B.1
Li, C.-C.2
Wu, K.3
Xiao, Y.4
-
6
-
-
0003851399
-
-
2nd Edition, John Wiley & Sons
-
B. Schneier, "Applied Cryptography: Protocols, Algorithms, and Source Code in C", 2nd Edition, John Wiley & Sons, 1996.
-
(1996)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
7
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-key Cryptosystems
-
R. L. Rivest, A. Shamir, and L. M. Adleman, "A Method for Obtaining Digital Signatures and Public-key Cryptosystems," Communications of the ACM, 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
9
-
-
0020271558
-
-
J.P. Plumstead (Boyar), Inferring a Sequence Generated by a Linear Congruence, 23rd Annual IEEE Symposium on the Foundations of Computer Science, pp. 153-159, 1982.
-
J.P. Plumstead (Boyar), "Inferring a Sequence Generated by a Linear Congruence," 23rd Annual IEEE Symposium on the Foundations of Computer Science, pp. 153-159, 1982.
-
-
-
-
10
-
-
0021819410
-
Deciphering a Linear Congruential Encryption
-
Jan
-
D.E. Knuth, "Deciphering a Linear Congruential Encryption," IEEE Tran. on Information Theory, vol. 31, no. 1, pp. 49-52, Jan. 1985.
-
(1985)
IEEE Tran. on Information Theory
, vol.31
, Issue.1
, pp. 49-52
-
-
Knuth, D.E.1
-
11
-
-
33144466214
-
RFID Privacy Using User-Controllable Uniqueness
-
MIT, MA, USA, Nov
-
S. Inoue and H. Yasuura, "RFID Privacy Using User-Controllable Uniqueness," RFID Privacy Workshop, MIT, MA, USA, Nov. 2003.
-
(2003)
RFID Privacy Workshop
-
-
Inoue, S.1
Yasuura, H.2
-
12
-
-
35048876270
-
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
-
Security in Pervasive Computing, of
-
S.A. Weis, S.E. Sarma, R. L. Rivest, and D. W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," Security in Pervasive Computing, vol. 2802 of LNCS, pp. 201-212, 2004.
-
(2004)
LNCS
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
|