-
1
-
-
33745797863
-
Untraceable RFID tags via insubvertible encryption
-
Atluri, V, Meadows, C, Juels, A, eds, Alexandria, VA, USA, November 7-11, ACM, New York () 2005
-
Ateniese, G., Camenisch, J., de Medeiros, B.: Untraceable RFID tags via insubvertible encryption. In: Atluri, V., Meadows, C., Juels, A. (eds.) Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 92-101. ACM, New York (2005)
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS
, pp. 92-101
-
-
Ateniese, G.1
Camenisch, J.2
de Medeiros, B.3
-
4
-
-
50249187613
-
Generalized Yoking-Proofs for a group of Radio Frequency Identification Tags
-
San Jose, CA
-
Bolotnyy, L., Rose, G.: Generalized Yoking-Proofs for a group of Radio Frequency Identification Tags. In: International Conference on Mobile and Ubiquitous Systems, MOBIQUITOUS 2006, San Jose, CA (2006)
-
(2006)
International Conference on Mobile and Ubiquitous Systems, MOBIQUITOUS
-
-
Bolotnyy, L.1
Rose, G.2
-
5
-
-
84877887414
-
Security analysis of a cryptographically-enabled RFID device
-
USENIX
-
Bono, S.C., Green, M., Stubblefield. A., Juels, A., Rubin, A.D., Szydlo, M.: Security analysis of a cryptographically-enabled RFID device. In: Proc. USENIX Security Symposium (USENIX Security 2005), pp. 1-16, USENIX (2005)
-
(2005)
Proc. USENIX Security Symposium (USENIX Security
, pp. 1-16
-
-
Bono, S.C.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.D.5
Szydlo, M.6
-
6
-
-
50049108255
-
Provably secure ubiquitous systems: Universally composable RFID authentication protocols
-
IEEE Press, Los Alamitos
-
Burmester, M., van Le, T., de Medeiros, B.: Provably secure ubiquitous systems: Universally composable RFID authentication protocols. In: Proceedings of the 2nd IEEE/CreateNet International Conference on Security and Privacy in Communication Networks (SECURECOMM 2006), IEEE Press, Los Alamitos (2006)
-
(2006)
Proceedings of the 2nd IEEE/CreateNet International Conference on Security and Privacy in Communication Networks (SECURECOMM
-
-
Burmester, M.1
van Le, T.2
de Medeiros, B.3
-
9
-
-
33750402779
-
Zero-knowledge device authentication: Privacy & security enhanced rfid preserving business value and consumer convenience
-
October 13-15, Wu Centre, University of New Brunswick, Fredericton () 2004
-
Engberg, S.J., Harning, M.B., Jensen, C.D.: Zero-knowledge device authentication: Privacy & security enhanced rfid preserving business value and consumer convenience. In: Proceedings of Second Annual Conference on Privacy, Security and Trust (PST 2004). October 13-15, 2004, pp. 89-101. Wu Centre, University of New Brunswick, Fredericton (2004)
-
(2004)
Proceedings of Second Annual Conference on Privacy, Security and Trust (PST
, pp. 89-101
-
-
Engberg, S.J.1
Harning, M.B.2
Jensen, C.D.3
-
10
-
-
45749095407
-
-
EPC Global
-
EPC Global. EPC tag data standards, vs. 1.3, http://www.epcglobalinc.org/ standards/EPCglobal_Tag_Data_Standard_TDS_Version_1.3.pdf
-
EPC tag data standards, vs. 1.3
-
-
-
11
-
-
52949083421
-
-
ISO/IEC
-
ISO/IEC, http://www.hightechaid.com/standards/18000.htm
-
-
-
-
13
-
-
34748848124
-
Universally composable and forward-secure RFID authentication and authenticated key exchange
-
Bao, F, Miller, S, eds, Singapore, March 20-22, ACM, New York () 2007
-
Van Le. T., Burmester, M., de Medeiros, B.: Universally composable and forward-secure RFID authentication and authenticated key exchange. In: Bao, F., Miller, S. (eds.) Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007), Singapore, March 20-22, 2007, pp. 242-252. ACM, New York (2007)
-
(2007)
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security (ASIACCS
, pp. 242-252
-
-
Van Le, T.1
Burmester, M.2
de Medeiros, B.3
-
14
-
-
33745597876
-
-
Molnar, D., Soppera, A., Wagner, D.: A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, 3897, Springer, Heidelberg (2006)
-
Molnar, D., Soppera, A., Wagner, D.: A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, Springer, Heidelberg (2006)
-
-
-
-
16
-
-
47649132152
-
Solving the simultaneous scanning problem anonymously: Clumping proofs for RFID tags
-
Istambul, Turkey, IEEE Computer Society Press, Los Alamitos
-
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: Solving the simultaneous scanning problem anonymously: clumping proofs for RFID tags. In: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing. SecPerl 2007, Istambul, Turkey, IEEE Computer Society Press, Los Alamitos (2007)
-
(2007)
Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing. SecPerl
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
17
-
-
33845948498
-
On existence proofs for multiple RFID tags
-
Lyon. France. June, IEEE Computer Society Press, Los Alamitos () 2006
-
Piramuthu, S.: On existence proofs for multiple RFID tags. In: IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU 2006, Lyon. France. June 2006. IEEE Computer Society Press, Los Alamitos (2006)
-
(2006)
IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU
-
-
Piramuthu, S.1
-
18
-
-
33744454961
-
Grouping Proof for RFID Tags
-
Taipei, Taiwan, 28-30 March, IEEE Computer Society, Los Alamitos () 2005
-
Saito, J., Sakurai, K.: Grouping Proof for RFID Tags. In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), Taipei, Taiwan, 28-30 March 2005, pp. 621-624. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
19th International Conference on Advanced Information Networking and Applications (AINA
, pp. 621-624
-
-
Saito, J.1
Sakurai, K.2
-
19
-
-
35248872610
-
RFID systems and security and privacy implications
-
Kaliski Jr, B.S, Koç, Ç.K, Paar, C, eds, Cryptographic Hardware and Embedded Systems, CHES 2002, 4th International Workshop, Redwood Shores, CA. USA, August 13-15, Springer, Heidelberg
-
Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems and security and privacy implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA. USA, August 13-15, 2002. LNCS, vol. 2523, pp. 454-469. Springer, Heidelberg (2003)
-
(2002)
LNCS
, vol.2523
, pp. 454-469
-
-
Sarma, S.E.1
Weis, S.A.2
Engels, D.W.3
-
20
-
-
34547635774
-
Severless Search and Authentication Protocols for RFID
-
White Plains, New York, USA, 19-23 March, IEEE Computer Society, Los Alamitos () 2007
-
Tan, C.C., Sheng. B., Li, Q.: Severless Search and Authentication Protocols for RFID. In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2007), White Plains, New York, USA, 19-23 March 2007, pp. 3-12. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom
, pp. 3-12
-
-
Tan, C.C.1
Sheng, B.2
Li, Q.3
-
21
-
-
33750290259
-
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
-
Pisa, Italy, 13-17 March, IEEE Computer Society, Los Alamitos
-
Tsudik, G.: YA-TRAP: Yet Another Trivial RFID Authentication Protocol. In: 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), Pisa, Italy, 13-17 March 2006, pp. 640-643. IEEE Computer Society, Los Alamitos (2006)
-
(2006)
4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops)
, pp. 640-643
-
-
Tsudik, G.1
|