-
1
-
-
33744957484
-
Adversarial Model for Radio Frequency Identificatin. Cryptology ePrint Archieve
-
Report 2005/049
-
Avoine, G.: Adversarial Model for Radio Frequency Identificatin. Cryptology ePrint Archieve, Report 2005/049 (2005), http://eprint.iacr.org
-
(2005)
-
-
Avoine, G.1
-
2
-
-
84945119254
-
Entity Authentication and Key Distribution
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
35048899238
-
-
Golle, P., Jakobsson, M., Jules, A., Syverson, P.: Universal Re-encryption for Mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, 2964, pp. 163-178. Springer, Heidelberg (2004)
-
Golle, P., Jakobsson, M., Jules, A., Syverson, P.: Universal Re-encryption for Mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163-178. Springer, Heidelberg (2004)
-
-
-
-
4
-
-
38049125926
-
LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System
-
Stajano, F, Kim, H.-J, Chae, J.-S, Kim, S.-D, eds, ICUCT 2006, Springer, Heidelberg
-
Ha, J., Ha, J., Moon, S., Boyd, C.: LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System. In: Stajano, F., Kim, H.-J., Chae, J.-S., Kim, S.-D. (eds.) ICUCT 2006. LNCS, vol. 4412, pp. 80-89. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4412
, pp. 80-89
-
-
Ha, J.1
Ha, J.2
Moon, S.3
Boyd, C.4
-
5
-
-
2942625823
-
Hash-based Enhancement of Loaction Privacy for Radio Frequency Identification Devices using Varing Identifiers. In: PERCOMW
-
Los Alamitos
-
Henrici, D., Müller, P.: Hash-based Enhancement of Loaction Privacy for Radio Frequency Identification Devices using Varing Identifiers. In: PERCOMW 2004, pp. 149-162. IEEE, Los Alamitos (2004)
-
(2004)
149-162. IEEE
, pp. 2004
-
-
Henrici, D.1
Müller, P.2
-
6
-
-
35248832722
-
-
Juels, A., Pappu, R.: Squealing Euros: Privacy Protection in RFID-enabled Banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, 2742, pp. 103-121. Springer, Heidelberg (2003)
-
Juels, A., Pappu, R.: Squealing Euros: Privacy Protection in RFID-enabled Banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 103-121. Springer, Heidelberg (2003)
-
-
-
-
7
-
-
18744409344
-
-
ACM CCS, ACM, New York 2003
-
Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for consumer Privacy. In: ACM CCS 2003, pp. 103-111. ACM, New York (2003)
-
(2003)
The Blocker Tag: Selective Blocking of RFID Tags for consumer Privacy
, pp. 103-111
-
-
Juels, A.1
Rivest, R.L.2
Szydlo, M.3
-
8
-
-
57049093325
-
Defining Strong Privacy for RFID, Cryptology ePrint Archieve
-
Report 2006/137
-
Jules, A., Weis, S.A.: Defining Strong Privacy for RFID, Cryptology ePrint Archieve, Report 2006/137 (2006), http://eprint.iacr.org
-
(2006)
-
-
Jules, A.1
Weis, S.A.2
-
10
-
-
38349029419
-
-
Li, Y., Cho, Y., Um, N., Lee, S.: Security and Privacy on Authentication for Lowcost RFID. In: Wang, Y., Cheung, Y.-m., Liu, H. (eds.) CIS 2006. LNCS (LNAI), 4456, pp. 788-794. Springer, Heidelberg (2007)
-
Li, Y., Cho, Y., Um, N., Lee, S.: Security and Privacy on Authentication for Lowcost RFID. In: Wang, Y., Cheung, Y.-m., Liu, H. (eds.) CIS 2006. LNCS (LNAI), vol. 4456, pp. 788-794. Springer, Heidelberg (2007)
-
-
-
-
11
-
-
38349031405
-
-
Li, Y., Jeong, Y., Sun, N., Lee, S.: Low-cost Authenticatoin Protocol of the RFID System Using Partial ID. In: Wang, Y., Cheung, Y.-m., Liu, H. (eds.) CIS 2006. LNCS (LNAI), 4456, pp. 598-604. Springer, Heidelberg (2007)
-
Li, Y., Jeong, Y., Sun, N., Lee, S.: Low-cost Authenticatoin Protocol of the RFID System Using Partial ID. In: Wang, Y., Cheung, Y.-m., Liu, H. (eds.) CIS 2006. LNCS (LNAI), vol. 4456, pp. 598-604. Springer, Heidelberg (2007)
-
-
-
-
12
-
-
34247218520
-
RFID Mutual Authentication Scheme based on Synchronized Secret Information
-
Lee, S., Asano, T., Kim, K.: RFID Mutual Authentication Scheme based on Synchronized Secret Information. In: SCIS 2006 (2006)
-
(2006)
SCIS
-
-
Lee, S.1
Asano, T.2
Kim, K.3
-
15
-
-
57049150181
-
-
Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID. In: SCIS 2004, pp. 719-724 (2004)
-
Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID. In: SCIS 2004, pp. 719-724 (2004)
-
-
-
-
16
-
-
24644501824
-
-
Rhee, K., Kwak, J., Kim, S., Won, D.: Challenge-Response Based RFID Authentication Protocol for Distributed Database Envirionment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, 3450, pp. 70-84. Springer, Heidelberg (2005)
-
Rhee, K., Kwak, J., Kim, S., Won, D.: Challenge-Response Based RFID Authentication Protocol for Distributed Database Envirionment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 70-84. Springer, Heidelberg (2005)
-
-
-
-
17
-
-
35048904109
-
-
Saito, J., Ryou, J., Sakurai, K.: Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags. In: Yang, L.T., Guo, M., Gao, G.R., Jha, N.K. (eds.) EUC 2004. LNCS, 3207, pp. 879-890. Springer, Heidelberg (2004)
-
Saito, J., Ryou, J., Sakurai, K.: Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags. In: Yang, L.T., Guo, M., Gao, G.R., Jha, N.K. (eds.) EUC 2004. LNCS, vol. 3207, pp. 879-890. Springer, Heidelberg (2004)
-
-
-
-
18
-
-
57049098642
-
-
RSA Laboratories
-
Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-Frequency Identification: Security Risks and Challenges, RSA Laboratories, vol. 6(1) (2003)
-
(2003)
Radio-Frequency Identification: Security Risks and Challenges
, vol.6
, Issue.1
-
-
Sarma, S.E.1
Weis, S.A.2
Engels, D.W.3
-
19
-
-
38149038702
-
On Privacy Models for RFID
-
Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
-
Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68-87. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 68-87
-
-
Vaudenay, S.1
-
21
-
-
35048876270
-
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
-
Hutter, D, Müller, G, Stephan, W, Ullmann, M, eds, Security in Pervasive Computing, Springer, Heidelberg
-
Weis, S.A., Sarma, S.E., Rivest, R.L., Engles, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 285-289. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2802
, pp. 285-289
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engles, D.W.4
|