-
1
-
-
33745915537
-
Backward channel protection method for RFID security schemes based on tree-walking algorithms
-
Proc. of International Conference on Computer Science and Applications. ICCSA 2006
-
Choi W., and Roh B.H. Backward channel protection method for RFID security schemes based on tree-walking algorithms. Proc. of International Conference on Computer Science and Applications. ICCSA 2006. LNCS vol. 3983 (2006) 279-287
-
(2006)
LNCS
, vol.3983
, pp. 279-287
-
-
Choi, W.1
Roh, B.H.2
-
2
-
-
51649086137
-
-
T.L. Lim, T. Li, Flexible privacy protection for RFID tags via selective identifier masking, in: Proc. of the IEEE Wireless Communications and Networking Conference, IEEE WCNC 2008, March 2008
-
T.L. Lim, T. Li, Flexible privacy protection for RFID tags via selective identifier masking, in: Proc. of the IEEE Wireless Communications and Networking Conference, IEEE WCNC 2008, March 2008
-
-
-
-
3
-
-
26444478592
-
RFID traceability: A multilayer problem
-
Financial Cryptography. FC'05
-
Avoine G., and Oechslin P. RFID traceability: A multilayer problem. Financial Cryptography. FC'05. LNCS vol. 3570 (March 2005) 125-140
-
(2005)
LNCS
, vol.3570
, pp. 125-140
-
-
Avoine, G.1
Oechslin, P.2
-
4
-
-
55549118642
-
-
S.A. Weis, Security and privacy in radio frequency identification devices, Masters Thesis, MIT, May 2003
-
S.A. Weis, Security and privacy in radio frequency identification devices, Masters Thesis, MIT, May 2003
-
-
-
-
5
-
-
55549146157
-
-
C. Castelluccia, G. Avoine, Noisy tags: A pretty good key exchange protocol for RFID tags, in: Proc. of the 7th International Conference on Smart Card Research and Advanced App., April 2006
-
C. Castelluccia, G. Avoine, Noisy tags: A pretty good key exchange protocol for RFID tags, in: Proc. of the 7th International Conference on Smart Card Research and Advanced App., April 2006
-
-
-
-
6
-
-
18744409344
-
-
A. Juels, R.L. Rivest, M. Szydlo, The blocker tag: Selective blocking of RFID tags for consumer privacy, in: Proc. of ACM Conference on Computer and Communications Security, ACM CCS'03, October 2003, pp. 103-111
-
A. Juels, R.L. Rivest, M. Szydlo, The blocker tag: Selective blocking of RFID tags for consumer privacy, in: Proc. of ACM Conference on Computer and Communications Security, ACM CCS'03, October 2003, pp. 103-111
-
-
-
-
7
-
-
55549092491
-
-
M.R. Rieback, B. Crispo, A.S. Tanenbaum, Keep on blockin' in the free world: Personal access control for low-cost RFID tags, in: Proc. of the 13th International Workshop on Security Protocols, April 2005
-
M.R. Rieback, B. Crispo, A.S. Tanenbaum, Keep on blockin' in the free world: Personal access control for low-cost RFID tags, in: Proc. of the 13th International Workshop on Security Protocols, April 2005
-
-
-
-
8
-
-
26444435642
-
RFID guardian: A battery-powered mobile device for RFID privacy management
-
Proc. of the 10th Australasian Conference on Information Security and Privacy. ACISP 2005
-
Rieback M.R., Crispo B., and Tanenbaum A.S. RFID guardian: A battery-powered mobile device for RFID privacy management. Proc. of the 10th Australasian Conference on Information Security and Privacy. ACISP 2005. LNCS vol. 3574 (July 2005) 184-194
-
(2005)
LNCS
, vol.3574
, pp. 184-194
-
-
Rieback, M.R.1
Crispo, B.2
Tanenbaum, A.S.3
-
9
-
-
55549105836
-
-
A. Juels, P. Syverson, D. Bailey, High-power proxies for enhancing RFID privacy and utility, in: Proc. of the 5th Workshop on Privacy Enhancing Technologies, PET'05, 2005
-
A. Juels, P. Syverson, D. Bailey, High-power proxies for enhancing RFID privacy and utility, in: Proc. of the 5th Workshop on Privacy Enhancing Technologies, PET'05, 2005
-
-
-
-
10
-
-
33750353849
-
-
T. Dimitriou, A secure and efficient RFID protocol that could make big brother (partially) obsolete, in: Proc. of the 4th IEEE International Conference on Pervasive Computing and Communications, PerCom 2006, 2006, pp. 269-275
-
T. Dimitriou, A secure and efficient RFID protocol that could make big brother (partially) obsolete, in: Proc. of the 4th IEEE International Conference on Pervasive Computing and Communications, PerCom 2006, 2006, pp. 269-275
-
-
-
-
11
-
-
34547617482
-
-
L. Lu, et al. Dynamic Key-updating: Privacy-preserving authentication for RFID systems, in: Proc. of the 5th IEEE International Conference on Pervasive Computing and Communications, PerCom 2007, 2007, pp. 13-22
-
L. Lu, et al. Dynamic Key-updating: Privacy-preserving authentication for RFID systems, in: Proc. of the 5th IEEE International Conference on Pervasive Computing and Communications, PerCom 2007, 2007, pp. 13-22
-
-
-
-
12
-
-
49149085742
-
-
D. Henrici, P. Muller, Providing security and privacy in RFID systems using triggered hash chains, in: Proc. of the 5th IEEE International Conference on Pervasive Computing and Communications, PerCom 2007, 2008
-
D. Henrici, P. Muller, Providing security and privacy in RFID systems using triggered hash chains, in: Proc. of the 5th IEEE International Conference on Pervasive Computing and Communications, PerCom 2007, 2008
-
-
-
-
13
-
-
55549087247
-
-
EPCglobal, EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz Version 1.0.9
-
EPCglobal, EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz Version 1.0.9
-
-
-
|