-
2
-
-
58449116704
-
-
David Sexton's Battery, http://www.geocities.com/da5id65536, 2005.
-
David Sexton's Battery, http://www.geocities.com/da5id65536, 2005.
-
-
-
-
3
-
-
33744939250
-
Adversary model for radio frequency identification,
-
Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPC, Security and Cryptography Laboratory LASEC
-
G. Avoine, "Adversary model for radio frequency identification, " Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPC), Security and Cryptography Laboratory (LASEC), 2005.
-
(2005)
-
-
Avoine, G.1
-
5
-
-
84877887414
-
Security analysis of a cryptographically-enabled RFID device
-
S. Bono, M. Green, A. Stubblefield, A. Juels, A. Rubin, and M. Szydlo, "Security analysis of a cryptographically-enabled RFID device," in Proceedings of the 14th Conference on USENIX Security Symposium, 2005, pp. 1-16.
-
(2005)
Proceedings of the 14th Conference on USENIX Security Symposium
, pp. 1-16
-
-
Bono, S.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.5
Szydlo, M.6
-
6
-
-
33751546328
-
Mutual authentication protocol for RFID conforming to EPC Class-1 Generation-2 standards
-
H. Y Chien and C. H. Chen, "Mutual authentication protocol for RFID conforming to EPC Class-1 Generation-2 standards," Computer Standards and Interfaces, Vol. 29, 2007, pp. 254-259.
-
(2007)
Computer Standards and Interfaces
, vol.29
, pp. 254-259
-
-
Chien, H.Y.1
Chen, C.H.2
-
7
-
-
33744940544
-
Efficient RFID authentication protocol for ubiquitous computing environment
-
Proceedings of the 1st International Workshop on Security in Ubiquitous Computing Systems SecUbiq
-
E. Y. Choi, S. M. Lee, and D. H. Lee, "Efficient RFID authentication protocol for ubiquitous computing environment," in Proceedings of the 1st International Workshop on Security in Ubiquitous Computing Systems (SecUbiq), LNCS 3823, 2005, pp. 945-954.
-
(2005)
LNCS
, vol.3823
, pp. 945-954
-
-
Choi, E.Y.1
Lee, S.M.2
Lee, D.H.3
-
8
-
-
34547653526
-
Lightweight asymmetric privacy-preserving authentication protocols secure against active attacks
-
Y. Cui, K. Kobara, K. Matsuura, and H. Imai, "Lightweight asymmetric privacy-preserving authentication protocols secure against active attacks," in Proceedings of the 5th IEEE International Conference on Pervasive Computing and Communications Workshops, 2007, pp. 223-228.
-
(2007)
Proceedings of the 5th IEEE International Conference on Pervasive Computing and Communications Workshops
, pp. 223-228
-
-
Cui, Y.1
Kobara, K.2
Matsuura, K.3
Imai, H.4
-
9
-
-
58449117783
-
RFID explained
-
White paper, 2004
-
R. Das, "RFID explained," IDTechEx, White paper, 2004.
-
IDTechEx
-
-
Das, R.1
-
11
-
-
58449120102
-
-
Class-1 Generation 2 UHF Air Interface Protocol Standard Version 1.0.9: Gen-2
-
Class-1 Generation 2 UHF Air Interface Protocol Standard Version 1.0.9: Gen-2, http://www.epcglobalinc.org/standards/.
-
-
-
-
12
-
-
58449109234
-
-
EPC Global
-
EPC Global, http://www.epcglobalinc.org/.
-
-
-
-
13
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems
-
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, "Strong authentication for RFID systems using the AES algorithm," in Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 3156, 2004, pp. 357-370.
-
(2004)
LNCS
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
15
-
-
85011285633
-
The strict avalanche criterion: Spectral properties of Boolean functions and an extended definition
-
Proceedings of Advances in Cryptology, CRYPTO
-
R. Forré, "The strict avalanche criterion: Spectral properties of Boolean functions and an extended definition," in Proceedings of Advances in Cryptology - CRYPTO, LNCS 403, 1990, pp. 450-468.
-
(1990)
LNCS
, vol.403
, pp. 450-468
-
-
Forré, R.1
-
19
-
-
77952285870
-
Security of ultra-lightweight RFID authentication protocols and its improvements
-
H. Y. Chien and C. W. Huang, "Security of ultra-lightweight RFID authentication protocols and its improvements," ACMSIGOPS Operating Systems Review, Vol. 41, 2007, pp. 83-86.
-
(2007)
ACMSIGOPS Operating Systems Review
, vol.41
, pp. 83-86
-
-
Chien, H.Y.1
Huang, C.W.2
-
20
-
-
58449111047
-
-
ISO, International Organization for Standardization
-
ISO - International Organization for Standardization, http://www.iso.org/.
-
-
-
-
21
-
-
58449083103
-
Security and privacy on authentication protocol for low-cost radio frequency identification,
-
Master Thesis, School of Engineering, Information and Communications University
-
J. Yang, "Security and privacy on authentication protocol for low-cost radio frequency identification," Master Thesis, School of Engineering, Information and Communications University, 2004.
-
(2004)
-
-
Yang, J.1
-
22
-
-
58449125280
-
Frequently asked questions
-
"Frequently asked questions," RFID Journal, http://www.rfidjournal.com, 2006.
-
(2006)
RFID Journal
-
-
-
23
-
-
23944476196
-
Minimalist cryptography for low-cost RFID tags
-
Proceedings of the 4th International Conference on Security in Communication Networks
-
A. Juels, "Minimalist cryptography for low-cost RFID tags," in Proceedings of the 4th International Conference on Security in Communication Networks, LNCS 3352, 2004, pp. 149-164.
-
(2004)
LNCS
, vol.3352
, pp. 149-164
-
-
Juels, A.1
-
25
-
-
33847249519
-
Security and privacy issues in e-passports
-
A. Juels, D. Molnar, and D. Wagner, "Security and privacy issues in e-passports," in Proceedings of the 1 st International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005, pp. 74-88.
-
(2005)
Proceedings of the 1 st International Conference on Security and Privacy for Emerging Areas in Communications Networks
, pp. 74-88
-
-
Juels, A.1
Molnar, D.2
Wagner, D.3
-
29
-
-
0012694899
-
Evolving a computer program to generate random number using the genetic programming paradigm
-
J. R. Koza, "Evolving a computer program to generate random number using the genetic programming paradigm," in Proceedings of the 4th International Conference on Genetic Algorithms, 1991, pp. 37-44.
-
(1991)
Proceedings of the 4th International Conference on Genetic Algorithms
, pp. 37-44
-
-
Koza, J.R.1
-
30
-
-
84889975404
-
From identification to authentication - A review of RFID product authentication techniques
-
Springer Berlin Heidelberg
-
M. Lehtonen, T. Staake, F. Michahelles, and E. Fleisch, "From identification to authentication - A review of RFID product authentication techniques," Networked RFID Systems and Lightweight Cryptography, Springer Berlin Heidelberg, 2007, pp. 169-187.
-
(2007)
Networked RFID Systems and Lightweight Cryptography
, pp. 169-187
-
-
Lehtonen, M.1
Staake, T.2
Michahelles, F.3
Fleisch, E.4
-
33
-
-
39349089777
-
Addressing the weakness in a lightweight RFID tag-reader mutual authentication scheme
-
T. L. Lim and T. Li, "Addressing the weakness in a lightweight RFID tag-reader mutual authentication scheme," in Proceedings of Global Telecommunications Conference, 2007, pp. 59-63.
-
(2007)
Proceedings of Global Telecommunications Conference
, pp. 59-63
-
-
Lim, T.L.1
Li, T.2
-
34
-
-
33745791751
-
Analysis of power constraints for cryptographic algorithms in mid-cost RFID tags
-
Proceedings of International Conference on Smart Card Research and Advanced Applications
-
T. Lohmmann, M. Schneider, and C. Ruland, "Analysis of power constraints for cryptographic algorithms in mid-cost RFID tags," in Proceedings of International Conference on Smart Card Research and Advanced Applications, LNCS 3928, 2006, pp. 278-288.
-
(2006)
LNCS
, vol.3928
, pp. 278-288
-
-
Lohmmann, T.1
Schneider, M.2
Ruland, C.3
-
36
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
D. Molnar and D. Wagner, "Privacy and security in library RFID: Issues, practices, and architectures," in Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004, pp. 210-219.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
37
-
-
36248949547
-
Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning
-
D. N. Due, J. Park, H. Lee, and K. Kim, "Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning," in Proceedings of Symposium on Cryptography and Information Security, 2006, pp. 97.
-
(2006)
Proceedings of Symposium on Cryptography and Information Security
, pp. 97
-
-
Due, D.N.1
Park, J.2
Lee, H.3
Kim, K.4
-
38
-
-
24944575863
-
Cryptographic approach to 'privacy-friendly' tags
-
M. Ohkubo, K. Suzuki, and S. Kinoshita, "Cryptographic approach to 'privacy-friendly' tags," in Proceedings of RFID Privacy Workshop, 2003, pp. 624-654.
-
(2003)
Proceedings of RFID Privacy Workshop
, pp. 624-654
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
39
-
-
36248971663
-
LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. Estevez-Tapiador, and A. Ribagorda, "LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags," in Proceedings of the 2nd Workshop on RFID Security, 2006, http://events.iaik.tugraz.at/RFIDSec06/Program/papers/ 013%20-%20Lightweight%20Mutual%20Authentication.pdf.
-
(2006)
Proceedings of the 2nd Workshop on RFID Security
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.3
Ribagorda, A.4
-
40
-
-
33750067948
-
M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags
-
Proceedings of International Conference on Ubiquitous Intelligence and Computing
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. Estevez-Tapiador, and A. Ribagorda, "M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags," in Proceedings of International Conference on Ubiquitous Intelligence and Computing, LNCS 4159, 2006, pp. 912-923.
-
(2006)
LNCS
, vol.4159
, pp. 912-923
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.3
Ribagorda, A.4
-
41
-
-
65749086917
-
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. Estevez-Tapiador, and A. Ribagorda, "Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard," in Proceedings of International Conference on RFID Security, 2007, http:// fidsec07.etsit.uma.es/.
-
(2007)
Proceedings of International Conference on RFID Security
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.3
Ribagorda, A.4
-
42
-
-
85130015071
-
RFID specification revisited
-
Auerbach Publications
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. Estevez-Tapiador, and A. Ribagorda, "RFID specification revisited," The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems chapter, Auerbach Publications, 2008, pp. 127-156.
-
(2008)
The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems chapter
, pp. 127-156
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.3
Ribagorda, A.4
-
43
-
-
33845455482
-
EMAP: An efficient mutual authentication protocol for low-cost RFID tags
-
Proceedings of OTM Federated Conferences and Workshop: IS Workshop
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, "EMAP: An efficient mutual authentication protocol for low-cost RFID tags," in Proceedings of OTM Federated Conferences and Workshop: IS Workshop, LNCS 4277, 2006, pp. 352-361.
-
(2006)
LNCS
, vol.4277
, pp. 352-361
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
45
-
-
32444435813
-
Radio frequency identification (RFID)
-
C. M. Roberts, "Radio frequency identification (RFID)," Computers and Security, Vol. 25, 2006, pp. 18-26.
-
(2006)
Computers and Security
, vol.25
, pp. 18-26
-
-
Roberts, C.M.1
-
46
-
-
35248872610
-
RFID systems and security and privacy implications
-
Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems
-
S. E. Sarma, S. A. Weis, and D. W. Engels, "RFID systems and security and privacy implications," in Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 2523, 2002, pp. 454-470.
-
(2002)
LNCS
, vol.2523
, pp. 454-470
-
-
Sarma, S.E.1
Weis, S.A.2
Engels, D.W.3
-
47
-
-
33750079626
-
Automatic identification and data collection technologies in the transportation industry: BarCode and RFID,
-
Technical Report
-
W. Sean and L. Thomas, "Automatic identification and data collection technologies in the transportation industry: BarCode and RFID," Technical Report, 2001.
-
(2001)
-
-
Sean, W.1
Thomas, L.2
-
48
-
-
0012022904
-
A cautionary note regarding evaluation of AES candidates on smart-cards
-
C. Suresh, J. Charanjit, J. R. Rao, and P. Rohatgi, "A cautionary note regarding evaluation of AES candidates on smart-cards," in Proceedings of the 2nd Advanced Encryption Standard Candidate Conference, 1999, pp. 133-147.
-
(1999)
Proceedings of the 2nd Advanced Encryption Standard Candidate Conference
, pp. 133-147
-
-
Suresh, C.1
Charanjit, J.2
Rao, J.R.3
Rohatgi, P.4
-
49
-
-
58449121448
-
-
San Francisco Business Times, Surging market for RFID security predicted, 2004, http://sanfrancisco.bizjournals.com/sanfrancisco/stories/ 2004/03/22/daily22.html.
-
San Francisco Business Times, "Surging market for RFID security predicted," 2004, http://sanfrancisco.bizjournals.com/sanfrancisco/stories/ 2004/03/22/daily22.html.
-
-
-
-
52
-
-
21144438831
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Proceedings of the 1st International Conference on Security in Pervasive Computing
-
S. Weis, S. Sarma, R. Rivest, and D. Engels, "Security and privacy aspects of low-cost radio frequency identification systems," in Proceedings of the 1st International Conference on Security in Pervasive Computing, LNCS 2802, 2003, pp. 454-469.
-
(2003)
LNCS
, vol.2802
, pp. 454-469
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
53
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Proceedings of the 1st International Conference on Security in Pervasive Computing
-
S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, "Security and privacy aspects of low-cost radio frequency identification systems," in Proceedings of the 1st International Conference on Security in Pervasive Computing, LNCS 2802, 2004, pp. 201-212.
-
(2004)
LNCS
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
54
-
-
0001853125
-
The computer for the 21st century
-
M. Weiser, "The computer for the 21st century," Scientific American, Vol. 265, 1991, pp. 94-104.
-
(1991)
Scientific American
, vol.265
, pp. 94-104
-
-
Weiser, M.1
-
55
-
-
84869815133
-
TEA, a tiny encryption algorithm
-
Proceedings of the 2nd International Workshop on Fast Software Encryption
-
D. J. Wheeler and R. M. Needham, "TEA, a tiny encryption algorithm," in Proceedings of the 2nd International Workshop on Fast Software Encryption, LNCS 1008, 1994, pp. 363-366.
-
(1994)
LNCS
, vol.1008
, pp. 363-366
-
-
Wheeler, D.J.1
Needham, R.M.2
-
56
-
-
15744395962
-
TEA extensions,
-
Technical Report, Computer Laboratory, University of Cambridge
-
D. J. Wheeler and R. M. Needham, "TEA extensions," Technical Report, Computer Laboratory, University of Cambridge, 1997.
-
(1997)
-
-
Wheeler, D.J.1
Needham, R.M.2
-
57
-
-
33749379761
-
Mutual authentication protocol for low-cost RFID
-
J. Yang, J. Park, H. Lee, K. Ren, and K. Kim, "Mutual authentication protocol for low-cost RFID," in Proceedings of Workshop on RFID and Lightweight Crypto, 2005, pp. 17-24
-
(2005)
Proceedings of Workshop on RFID and Lightweight Crypto
, pp. 17-24
-
-
Yang, J.1
Park, J.2
Lee, H.3
Ren, K.4
Kim, K.5
|