-
2
-
-
55749101227
-
-
http://www.woodmann.com/fravia/crctut1.htm
-
Anarchriz. CRC and how to reverse it (1999). http://www.woodmann.com/fravia/crctut1.htm http://www.woodmann.com/fravia/crctut1.htm
-
(1999)
CRC and how to reverse it
-
-
Anarchriz1
-
4
-
-
38549133187
-
Security analysis of a cryptographically-enabled device
-
Usenix Association
-
Bono S., Greem M., Stubblefield A., Juels A., Rubin A., and Syzdlo M. Security analysis of a cryptographically-enabled device. Proc. of SSYM'05 (2005), Usenix Association
-
(2005)
Proc. of SSYM'05
-
-
Bono, S.1
Greem, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.5
Syzdlo, M.6
-
5
-
-
33751546328
-
-
Elsevier Science Publishers (2)
-
Chien H.-Y., and Chen C.-H. Mutual authentication protocol for RFID conforming to EPC class-1 generation-2 standards. Computer Standards & Interfaces vol. 29 (February 2007), Elsevier Science Publishers 254-259 (2)
-
(2007)
Computer Standards & Interfaces
, vol.29
, pp. 254-259
-
-
Chien, H.-Y.1
Chen, C.-H.2
-
6
-
-
33750082441
-
Efficient RFID authentication protocol for ubiquitous computing environment
-
LNCS
-
Choi E.Y., Lee S.M., and Lee D.H. Efficient RFID authentication protocol for ubiquitous computing environment. Proc. of SECUBIQ'05 (2005), LNCS
-
(2005)
Proc. of SECUBIQ'05
-
-
Choi, E.Y.1
Lee, S.M.2
Lee, D.H.3
-
7
-
-
33847330246
-
A lightweight RFID protocol to protect against traceability and cloning attacks
-
Dimitriou T. A lightweight RFID protocol to protect against traceability and cloning attacks. In Proc. of SECURECOMM'05 (2005)
-
(2005)
In Proc. of SECURECOMM'05
-
-
Dimitriou, T.1
-
10
-
-
38149047468
-
Low-cost and strong- security RFID authentication protocol
-
Proc. of EUC Workshops, Springer
-
Ha J., Moon S.J., Gonzlez Nieto J.M., and Boyd C. Low-cost and strong- security RFID authentication protocol. Proc. of EUC Workshops. LNCS vol. 4809 (2007), Springer 795-807
-
(2007)
LNCS
, vol.4809
, pp. 795-807
-
-
Ha, J.1
Moon, S.J.2
Gonzlez Nieto, J.M.3
Boyd, C.4
-
11
-
-
2942625823
-
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
-
IEEE Computer Society
-
Henrici D., and Müller P. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. Proc. of PERSEC'04 (2004), IEEE Computer Society 149-153
-
(2004)
Proc. of PERSEC'04
, pp. 149-153
-
-
Henrici, D.1
Müller, P.2
-
14
-
-
55749084068
-
-
N. Karten and H. Pltz. Mifare little security, despite obscurity. http://events.ccc.de/congress/2007/Fahrplan/events/2378.en.html.
-
N. Karten and H. Pltz. Mifare little security, despite obscurity. http://events.ccc.de/congress/2007/Fahrplan/events/2378.en.html.
-
-
-
-
15
-
-
33745938362
-
RFID security without extensive cryptography
-
ACM
-
Karthikeyan S., and Nesterenko M. RFID security without extensive cryptography. Proc. of SASN '05 (2005), ACM 63-67
-
(2005)
Proc. of SASN '05
, pp. 63-67
-
-
Karthikeyan, S.1
Nesterenko, M.2
-
17
-
-
39349089777
-
Addressing the weakness in a lightweight RFID tag-reader mutual authentication scheme
-
Lim T.L., and Li T. Addressing the weakness in a lightweight RFID tag-reader mutual authentication scheme. Proc. of GLOBECOM'07 (2007)
-
(2007)
Proc. of GLOBECOM'07
-
-
Lim, T.L.1
Li, T.2
-
20
-
-
38149085988
-
An efficient authentication protocol in RFID systems resistant to active attacks
-
Proc. of SecUbiq'06, Springer-Verlag
-
Peris-Lopez P., Hernandez-Castro J.C., Estevez-Tapiador J.M., and Ribagorda A. An efficient authentication protocol in RFID systems resistant to active attacks. Proc. of SecUbiq'06. LNCS vol. 4809 (2007), Springer-Verlag 781-794
-
(2007)
LNCS
, vol.4809
, pp. 781-794
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
22
-
-
33947538532
-
Protocols for RFID tag/reader authentication
-
Piramuthu S. Protocols for RFID tag/reader authentication. Decis. support syst. 43 3 (2007) 897-914
-
(2007)
Decis. support syst.
, vol.43
, Issue.3
, pp. 897-914
-
-
Piramuthu, S.1
-
24
-
-
47049103630
-
Confronting security and privacy threats in modern RFID systems
-
Ranasinghe D.C., and Cole P.H. Confronting security and privacy threats in modern RFID systems. Proc. of ACSSC '06 (2006) 2058-2064
-
(2006)
Proc. of ACSSC '06
, pp. 2058-2064
-
-
Ranasinghe, D.C.1
Cole, P.H.2
-
25
-
-
35248872610
-
RFID systems and security and privacy implications
-
Proc. of CHES'02
-
Sarma S., Weis S., and Engels D. RFID systems and security and privacy implications. Proc. of CHES'02. LNCS vol. 2523 (2002) 454-470
-
(2002)
LNCS
, vol.2523
, pp. 454-470
-
-
Sarma, S.1
Weis, S.2
Engels, D.3
-
26
-
-
55749116198
-
-
A. Shamir. SQUASH - a new MAC with provable security properties for highly constrained devices such as RFID tags. In Proc. of FSE'08, volume In Press of LNCS. Springer-Verlag, in press.
-
A. Shamir. SQUASH - a new MAC with provable security properties for highly constrained devices such as RFID tags. In Proc. of FSE'08, volume In Press of LNCS. Springer-Verlag, in press.
-
-
-
-
27
-
-
34548107154
-
Reversing CRC theory and practice
-
Humboldt-Universitat, Berlin
-
Stigge M., Pltz H., Mller W., and Redlich J.-P. Reversing CRC theory and practice. Technical Report SAR-PR-2006-05 (2006), Humboldt-Universitat, Berlin
-
(2006)
Technical Report SAR-PR-2006-05
-
-
Stigge, M.1
Pltz, H.2
Mller, W.3
Redlich, J.-P.4
-
29
-
-
21144438831
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Proc. of SPC'03
-
Weis S., Sarma S., Rivest R., and Engels D. Security and privacy aspects of low-cost radio frequency identification systems. Proc. of SPC'03. LNCS vol. 2802 (2003) 454-469
-
(2003)
LNCS
, vol.2802
, pp. 454-469
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
30
-
-
55749087538
-
-
http://blog.w-nz.com/archives/2005/07/15/reversing-crc/
-
Westerbaan B. Reversing CRC (2005). http://blog.w-nz.com/archives/2005/07/15/reversing-crc/ http://blog.w-nz.com/archives/2005/07/15/reversing-crc/
-
(2005)
Reversing CRC
-
-
Westerbaan, B.1
|