-
1
-
-
38149037913
-
Passive attacks on a class of authentication protocols for RFID
-
B. Alomair, L. Lazos, and R. Poovendran. Passive attacks on a class of authentication protocols for RFID. In ICISC, pages 102-115, 2007.
-
(2007)
ICISC
, pp. 102-115
-
-
Alomair, B.1
Lazos, L.2
Poovendran, R.3
-
2
-
-
33744939250
-
Adversary model for radio frequency identification
-
Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL, Security and Cryptography Laboratory LASEC, Lausanne, Switzerland, September
-
G. Avoine. Adversary model for radio frequency identification. Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland, September 2005.
-
(2005)
-
-
Avoine, G.1
-
3
-
-
33646036428
-
Limits of the cryptographic realization of Dolev-Yao-style XOR
-
M. Backes and B. Pfitzmann. Limits of the cryptographic realization of Dolev-Yao-style XOR. In ESORICS, pages 178-196, 2005.
-
(2005)
ESORICS
, pp. 178-196
-
-
Backes, M.1
Pfitzmann, B.2
-
4
-
-
33751546328
-
Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards
-
February
-
H.-Y. Chien and C.-H. Chen. Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computer Standars & Interfaces, Elsevier Science Publishers, 29(2):254-259, February 2007.
-
(2007)
Computer Standars & Interfaces, Elsevier Science Publishers
, vol.29
, Issue.2
, pp. 254-259
-
-
Chien, H.-Y.1
Chen, C.-H.2
-
5
-
-
38149091047
-
A lightweight RFID protocol using substring
-
H.-Y. Chien and C.-W. Huang. A lightweight RFID protocol using substring. In EUC, pages 422-431, 2007.
-
(2007)
EUC
, pp. 422-431
-
-
Chien, H.-Y.1
Huang, C.-W.2
-
6
-
-
34547696859
-
Cryptanalysis of two lightweight RFID authentication schemes
-
B. Defend, K. Fu, and A. Juels. Cryptanalysis of two lightweight RFID authentication schemes. In PerCom Workshops, pages 211-216, 2007.
-
(2007)
PerCom Workshops
, pp. 211-216
-
-
Defend, B.1
Fu, K.2
Juels, A.3
-
7
-
-
44649113207
-
Untraceability of RFID protocols
-
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, of, Seville, Spain, Springer
-
T. v. Deursen, S. Mauw, and S. Radomirović. Untraceability of RFID protocols. In Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, volume 5019 of Lecture Notes in Computer Science, pages 1-15, Seville, Spain, 2008. Springer.
-
(2008)
Lecture Notes in Computer Science
, vol.5019
, pp. 1-15
-
-
Deursen, T.V.1
Mauw, S.2
Radomirović, S.3
-
8
-
-
58149087444
-
-
T. v. Deursen and S. Radomirovic. Attacks on RFID protocols version 1.0, Cryptology ePrint Archive, Report 2008/310, July 2008
-
T. v. Deursen and S. Radomirovic. Attacks on RFID protocols (version 1.0). Cryptology ePrint Archive, Report 2008/310, July 2008.
-
-
-
-
9
-
-
38049010942
-
Information confinement, privacy, and security in RFID systems
-
R. Di Pietro and R. Molva. Information confinement, privacy, and security in RFID systems. In ESORICS, pages 187-202, 2007.
-
(2007)
ESORICS
, pp. 187-202
-
-
Di Pietro, R.1
Molva, R.2
-
10
-
-
38149047468
-
Low-cost and strong-security RFID authentication protocol
-
J. Ha, S.-J. Moon, J. M. G. Nieto, and C. Boyd. Low-cost and strong-security RFID authentication protocol. In EUC Workshops, pages 795-807, 2007.
-
(2007)
EUC Workshops
, pp. 795-807
-
-
Ha, J.1
Moon, S.-J.2
Nieto, J.M.G.3
Boyd, C.4
-
11
-
-
38549103545
-
Security analysis and enhancement of one-way hash based low-cost authentication protocol (OHLCAP)
-
J. Ha, S.-J. Moon, J. M. G. Nieto, and C. Boyd. Security analysis and enhancement of one-way hash based low-cost authentication protocol (OHLCAP). In PAKDD Workshops, pages 574-583, 2007.
-
(2007)
PAKDD Workshops
, pp. 574-583
-
-
Ha, J.1
Moon, S.-J.2
Nieto, J.M.G.3
Boyd, C.4
-
12
-
-
34547687590
-
Defining strong privacy for RFID
-
A. Juels and S. A. Weis. Defining strong privacy for RFID. In PerCom Workshops, pages 342-347, 2007.
-
(2007)
PerCom Workshops
, pp. 342-347
-
-
Juels, A.1
Weis, S.A.2
-
13
-
-
58149100777
-
Secure mobile RFID system against privacy and security problems
-
I. J. Kim, E. Y. Choi, and D. H. Lee. Secure mobile RFID system against privacy and security problems. In SecPerU 2007, 2007.
-
(2007)
SecPerU 2007
-
-
Kim, I.J.1
Choi, E.Y.2
Lee, D.H.3
-
14
-
-
57849147967
-
Security analysis of two ultra-lightweight RFID authentication protocols
-
Sandton, Gauteng, South Africa, May, IFIP
-
T. Li and G. Wang. Security analysis of two ultra-lightweight RFID authentication protocols. In IFIP SEC 2007, Sandton, Gauteng, South Africa, May 2007. IFIP.
-
(2007)
IFIP SEC 2007
-
-
Li, T.1
Wang, G.2
-
15
-
-
34748921704
-
Protecting RFID communications in supply chains
-
Y. Li and X. Ding. Protecting RFID communications in supply chains. In ASIACCS, pages 234-241, 2007.
-
(2007)
ASIACCS
, pp. 234-241
-
-
Li, Y.1
Ding, X.2
-
16
-
-
0030708255
-
A hierarchy of authentication specifications
-
G. Lowe. A hierarchy of authentication specifications. In CSFW, pages 31-44, 1997.
-
(1997)
CSFW
, pp. 31-44
-
-
Lowe, G.1
-
17
-
-
33745597876
-
A scalable, dele-gatable pseudonym protocol enabling ownership transfer of RFID tags
-
D. Molnar, A. Soppera, and D. Wagner. A scalable, dele-gatable pseudonym protocol enabling ownership transfer of RFID tags. In Selected Areas in Cryptography, pages 276-290, 2005.
-
(2005)
Selected Areas in Cryptography
, pp. 276-290
-
-
Molnar, D.1
Soppera, A.2
Wagner, D.3
-
18
-
-
38349066494
-
An efficient and secure RFID security method with ownership transfer
-
K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi. An efficient and secure RFID security method with ownership transfer. In CIS, pages 778-787, 2006.
-
(2006)
CIS
, pp. 778-787
-
-
Osaka, K.1
Takagi, T.2
Yamazaki, K.3
Takahashi, O.4
-
20
-
-
33744928896
-
Reassignment scheme of an RFID tag's key for owner transfer
-
J. Saito, K. Imamoto, and K. Sakurai. Reassignment scheme of an RFID tag's key for owner transfer. In EUC Workshops, pages 1303-1312, 2005.
-
(2005)
EUC Workshops
, pp. 1303-1312
-
-
Saito, J.1
Imamoto, K.2
Sakurai, K.3
-
21
-
-
56749103027
-
RFID authentication protocol for low-cost tags
-
B. Song and C. J. Mitchell. RFID authentication protocol for low-cost tags. In WISEC, pages 140-147, 2008.
-
(2008)
WISEC
, pp. 140-147
-
-
Song, B.1
Mitchell, C.J.2
-
22
-
-
33751520626
-
Mutual authentication protocol for low-cost RFID
-
July
-
J. Yang, J. Park, H. Lee, K. Ren, and K. Kim. Mutual authentication protocol for low-cost RFID. Handout of the Ecrypt Workshop on RFID and Lightweight Crypto, July 2005.
-
(2005)
Handout of the Ecrypt Workshop on RFID and Lightweight Crypto
-
-
Yang, J.1
Park, J.2
Lee, H.3
Ren, K.4
Kim, K.5
|