-
1
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. Oorschot, and M. Wiener, "Authentication and authenticated key exchanges," Designs, Codes and Cryptography, vol. 2, no. 2, pp. 107-125, 1992.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Oorschot, P.2
Wiener, M.3
-
2
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," ACM Transactions on Computer Systems (TOCS), vol. 8, no. 1, pp. 18-36, 1990.
-
(1990)
ACM Transactions on Computer Systems (TOCS)
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
3
-
-
85016462400
-
Systematic Design of Two-Party Authentication Protocols
-
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, and M. Yung, "Systematic Design of Two-Party Authentication Protocols," Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology, pp. 44-61, 1991.
-
(1991)
Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
, pp. 44-61
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
4
-
-
84945119254
-
Entity authentication and key distribution
-
Springer
-
M. Bellare and P. Rogaway, "Entity authentication and key distribution," in Advances in Cryptology-CRYPTO, vol. 773. Springer, 1993, pp. 232-249.
-
(1993)
Advances in Cryptology-CRYPTO
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
33644534001
-
Lightweight authentication protocols for low-cost RFID tags
-
Seattle, WA, USA, October
-
I. Vajda and L. Buttyán, "Lightweight authentication protocols for low-cost RFID tags," in Second Workshop on Security in Ubiquitous Computing - Ubicomp 2003, Seattle, WA, USA, October 2003.
-
(2003)
Second Workshop on Security in Ubiquitous Computing - Ubicomp 2003
-
-
Vajda, I.1
Buttyán, L.2
-
7
-
-
33745181952
-
-
A. Juels and S. Weis, Authenticating pervasive devices with human protocols, in Advances in Cryptology - CRYPTO'05, ser. Lecture Notes in Computer Science, V. Shoup, Ed., 3126, IACR. Santa Barbara, California, USA: Springer-Verlag, August 2005, pp. 293-308.
-
A. Juels and S. Weis, "Authenticating pervasive devices with human protocols," in Advances in Cryptology - CRYPTO'05, ser. Lecture Notes in Computer Science, V. Shoup, Ed., vol. 3126, IACR. Santa Barbara, California, USA: Springer-Verlag, August 2005, pp. 293-308.
-
-
-
-
8
-
-
36248971663
-
LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags
-
Graz, Austria, July
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. Estevez-Tapiador, and A. Ribagorda, "LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags," Printed handout of Workshop on RFID Security - RFIDSec 06, Ecrypt, Graz, Austria, July 2006.
-
(2006)
Printed handout of Workshop on RFID Security - RFIDSec 06, Ecrypt
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.3
Ribagorda, A.4
-
9
-
-
33750067948
-
M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags
-
International Conference on Ubiquitous Intelligence and Computing, UIC06, Springer-Verlag, September
-
_, "M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags," in International Conference on Ubiquitous Intelligence and Computing - UIC06, ser. Lecture Notes in Computer Science, vol. 4159. Springer-Verlag, September 2006, pp. 912-923.
-
(2006)
ser. Lecture Notes in Computer Science
, vol.4159
, pp. 912-923
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.3
Ribagorda, A.4
-
10
-
-
33845455482
-
EMAP: An efficient mutual authentication protocol for low-cost RFID tags
-
OTM Federated Conferences and Workshop: IS Workshop, IS'06, Springer-Verlag, November
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, "EMAP: An efficient mutual authentication protocol for low-cost RFID tags." in OTM Federated Conferences and Workshop: IS Workshop - IS'06, ser. Lecture Notes in Computer Science, vol. 4277. Springer-Verlag, November 2006, pp. 352-361.
-
(2006)
ser. Lecture Notes in Computer Science
, vol.4277
, pp. 352-361
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
11
-
-
35248872610
-
-
S. Sarma, S. Weis, and D. Engels, RFID systems and security and privacy implications, in Cryptographic Hardware and Embedded Systems - CHES 2002, ser. Lecture Notes in Computer Science, B. Kaliski, c. Kaya ço, and C. Paar, Eds., 2523. Redwood Shores, CA, USA: Springer-Verlag, August 2002, pp. 454-469.
-
S. Sarma, S. Weis, and D. Engels, "RFID systems and security and privacy implications," in Cryptographic Hardware and Embedded Systems - CHES 2002, ser. Lecture Notes in Computer Science, B. Kaliski, c. Kaya ço, and C. Paar, Eds., vol. 2523. Redwood Shores, CA, USA: Springer-Verlag, August 2002, pp. 454-469.
-
-
-
-
12
-
-
34547696859
-
Cryptanalysis of two lightweight RFID authentication schemes
-
IEEE. New York, USA: IEEE Computer Society Press, March
-
B. Defend, K. Fu, and A. Juels, "Cryptanalysis of two lightweight RFID authentication schemes," in International Workshop on Pervasive Computing and Communication Security - PerSec 2007, IEEE. New York, USA: IEEE Computer Society Press, March 2007, pp. 211-216.
-
(2007)
International Workshop on Pervasive Computing and Communication Security - PerSec 2007
, pp. 211-216
-
-
Defend, B.1
Fu, K.2
Juels, A.3
-
13
-
-
70349284581
-
Secure human identification protocols
-
Advances in Cryptology, ASIACRYPT 2001, Springer
-
N. Hopper and M. Blum, "Secure human identification protocols," in Advances in Cryptology - ASIACRYPT 2001, ser. Lecture Notes in Computer Science, vol. 2248/2001. Springer, 2001.
-
(2001)
ser. Lecture Notes in Computer Science
, vol.2248
-
-
Hopper, N.1
Blum, M.2
-
14
-
-
0017973512
-
On the inherent intractability of certain coding problems (Corresp.)
-
E. Berlekamp, R. McEliece, and H. van Tilborg, "On the inherent intractability of certain coding problems (Corresp.)," Information Theory, IEEE Transactions on, vol. 24, no. 3, pp. 384-386, 1978.
-
(1978)
Information Theory, IEEE Transactions on
, vol.24
, Issue.3
, pp. 384-386
-
-
Berlekamp, E.1
McEliece, R.2
van Tilborg, H.3
-
15
-
-
0000097412
-
How to prove yourself: Practical solutions to identification and signature problems
-
Springer
-
A. Fiat and A. Shamir, "How to prove yourself: Practical solutions to identification and signature problems," in Advances in Cryptology-CRYPTO, vol. 86. Springer, 1986, pp. 186-194.
-
(1986)
Advances in Cryptology-CRYPTO
, vol.86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
17
-
-
57849147967
-
Security analysis of two ultra-lightweight RFID authentication protocols
-
Sandton, Gauteng, South Africa: IFIP, May
-
T. Li and G. Wang, "Security analysis of two ultra-lightweight RFID authentication protocols," in IFIP SEC 2007. Sandton, Gauteng, South Africa: IFIP, May 2007.
-
(2007)
IFIP SEC 2007
-
-
Li, T.1
Wang, G.2
-
18
-
-
34548162681
-
Vulnerability analysis of EMAP - an efficient RFID mutual authentication protocol
-
Vienna, Austria, April
-
T. Li and R. H. Deng, "Vulnerability analysis of EMAP - an efficient RFID mutual authentication protocol," in Second International Conference on Availability, Reliability and Security - AReS 2007, Vienna, Austria, April 2007.
-
(2007)
Second International Conference on Availability, Reliability and Security - AReS 2007
-
-
Li, T.1
Deng, R.H.2
-
19
-
-
38149037913
-
-
B. Alomair, L. Lazos, and R. Poovendran, Passive attacks on a class of authentication protocols for RFID, in International Conference on Information Security and Cryptology - ICISC, ser. Lecture Notes in Computer Science, K.-H. Nam and G. Rhee, Eds., 4817. Seoul, Korea: Springer-Verlag, November 2007, pp. 102-115.
-
B. Alomair, L. Lazos, and R. Poovendran, "Passive attacks on a class of authentication protocols for RFID," in International Conference on Information Security and Cryptology - ICISC, ser. Lecture Notes in Computer Science, K.-H. Nam and G. Rhee, Eds., vol. 4817. Seoul, Korea: Springer-Verlag, November 2007, pp. 102-115.
-
-
-
-
20
-
-
58049161510
-
Passive attack against the M2AP mutual authentication protocol for RFID tags
-
Vienna, Austria, September
-
M. Bárász, B. Boros, P. Ligeti, K. Lója, and D. Nagy, "Passive attack against the M2AP mutual authentication protocol for RFID tags," in First International EURASIP Workshop on RFID Technology, Vienna, Austria, September 2007.
-
(2007)
First International EURASIP Workshop on RFID Technology
-
-
Bárász, M.1
Boros, B.2
Ligeti, P.3
Lója, K.4
Nagy, D.5
-
22
-
-
35048859848
-
-
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, Strong authentication for RFID systems using the AES algorithm, in Workshop on Cryptographic Hardware and Embedded Systems - CHES 2004, ser. Lecture Notes in Computer Science, M. Joye and J.-J. Quisquater, Eds., 3156, IACR. Boston, Massachusetts, USA: Springer-Verlag, August 2004, pp. 357-370.
-
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, "Strong authentication for RFID systems using the AES algorithm," in Workshop on Cryptographic Hardware and Embedded Systems - CHES 2004, ser. Lecture Notes in Computer Science, M. Joye and J.-J. Quisquater, Eds., vol. 3156, IACR. Boston, Massachusetts, USA: Springer-Verlag, August 2004, pp. 357-370.
-
-
-
|