-
2
-
-
35048876270
-
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
-
Hutter, D, Müller, G, Stephan, W, Ullmann, M, eds, Security in Pervasive Computing, Springer, Heidelberg
-
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201-212. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
3
-
-
57049143703
-
-
Avoine, G.: Privacy Issues in RFID Banknote Protection Schemes. In: CARDIS, pp. 34-38. Kluwer, Dordrecht (2004)
-
Avoine, G.: Privacy Issues in RFID Banknote Protection Schemes. In: CARDIS, pp. 34-38. Kluwer, Dordrecht (2004)
-
-
-
-
5
-
-
26444443915
-
A Scalable and Provably Secure Hash-Based RFID Protocol. In: PerSec
-
Los Alamitos
-
Avoine, G., Oechslin, P.: A Scalable and Provably Secure Hash-Based RFID Protocol. In: PerSec, pp. 110-114. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
IEEE Computer Society Press
, pp. 110-114
-
-
Avoine, G.1
Oechslin, P.2
-
6
-
-
26444478592
-
-
Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, 3570, pp. 125-140. Springer, Heidelberg (2005)
-
Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 125-140. Springer, Heidelberg (2005)
-
-
-
-
8
-
-
50049108255
-
Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols
-
Burmester, M., van Le, T., de Medeiros, B.: Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols. In: SecureComm. (2006)
-
(2006)
SecureComm
-
-
Burmester, M.1
van Le, T.2
de Medeiros, B.3
-
9
-
-
23944476196
-
-
Juels, A.: Minimalist Cryptography for Low-Cost RFID Tags. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, 3352, pp. 149-164. Springer, Heidelberg (2005)
-
Juels, A.: Minimalist Cryptography for Low-Cost RFID Tags. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 149-164. Springer, Heidelberg (2005)
-
-
-
-
13
-
-
33749994390
-
Efficient hash-chain based RFID privacy protection scheme
-
Ohkubo, M., Suzuki, K., Kinoshita, S.: Efficient hash-chain based RFID privacy protection scheme. In: UbiComp Workshop, Ubicomp Privacy: Current Status and Future Directions (2004)
-
(2004)
UbiComp Workshop, Ubicomp Privacy: Current Status and Future Directions
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
14
-
-
57049129375
-
-
Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID. In: SCIS (2004)
-
Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID. In: SCIS (2004)
-
-
-
-
15
-
-
25444432606
-
RFID Privacy Issues and Technical Challenges
-
Ohkubo, M., Suzuki, K., Kinoshita, S.: RFID Privacy Issues and Technical Challenges. Communications of the ACM 48(9), 66-71 (2005)
-
(2005)
Communications of the ACM
, vol.48
, Issue.9
, pp. 66-71
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
16
-
-
38149038702
-
On Privacy Models for RFID
-
Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
-
Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68-87. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 68-87
-
-
Vaudenay, S.1
-
17
-
-
33745597876
-
-
Molnar, D., Soppera, A.,Wagner, D.: A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, 3897, pp. 276-290. Springer, Heidelberg (2006)
-
Molnar, D., Soppera, A.,Wagner, D.: A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 276-290. Springer, Heidelberg (2006)
-
-
-
-
18
-
-
43149103199
-
-
Damgård, I., Pedersen, M.Ø.: RFID Security: Tradeoffs between Security and Efficiency. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, 4964, pp. 318-332. Springer, Heidelberg (2008)
-
Damgård, I., Pedersen, M.Ø.: RFID Security: Tradeoffs between Security and Efficiency. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 318-332. Springer, Heidelberg (2008)
-
-
-
-
19
-
-
35048899238
-
-
Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal Re-Encryption for Mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, 2964, pp. 163-178. Springer, Heidelberg (2004)
-
Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal Re-Encryption for Mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163-178. Springer, Heidelberg (2004)
-
-
-
-
20
-
-
2942625823
-
Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. In: PerSec
-
Los Alamitos
-
Henrici, D., Muller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. In: PerSec, pp. 149-153. IEEE Computer Society Press, Los Alamitos (2004)
-
(2004)
IEEE Computer Society Press
, pp. 149-153
-
-
Henrici, D.1
Muller, P.2
-
21
-
-
77952345634
-
-
Burmester, M., de Medeiros, B., Motta, R.: Robust, Anonymous RFID Authentication with Constant Key-Lookup. In: ASIACCS, pp. 283-291. ACM, New York (2008)
-
Burmester, M., de Medeiros, B., Motta, R.: Robust, Anonymous RFID Authentication with Constant Key-Lookup. In: ASIACCS, pp. 283-291. ACM, New York (2008)
-
-
-
|