-
1
-
-
33144457479
-
RFID security and privacy: A research survey
-
Feb
-
A. Juels, "RFID security and privacy: a research survey," IEEE Journal on Selected Areas in Communications (JSAC), vol. 24, no. 2, pp. 381-394, Feb. 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications (JSAC)
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
2
-
-
84857111974
-
-
N. Chaudhry, D. R. Thompson, and C. Thompson, RFID Technical Tutorial and Threat Modeling, ver. 1.0, tech. report, Dept. of Computer Science and Computer Engineering, University of Arkansas, Fayetteville, Arkansas, Dec. 8, 2005. Available
-
N. Chaudhry, D. R. Thompson, and C. Thompson, RFID Technical Tutorial and Threat Modeling, ver. 1.0, tech. report, Dept. of Computer Science and Computer Engineering, University of Arkansas, Fayetteville, Arkansas, Dec. 8, 2005. Available: http://comp.uark.edu/-drt/rfid
-
-
-
-
3
-
-
33745597876
-
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
-
Selected Areas in Cryptography SAC 2005;
-
D. Molnar, A. Soppera, and D. Wagner, "A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags," in Selected Areas in Cryptography SAC 2005; Lecture Notes in Computer Science, 2005, pp. 276-290.
-
(2005)
Lecture Notes in Computer Science
, pp. 276-290
-
-
Molnar, D.1
Soppera, A.2
Wagner, D.3
-
4
-
-
85012989086
-
An efficient and secure RFID security method with ownership transfer
-
K. Osaka, T. Takagi, K. Yamazaki and O. Takahashi, "An efficient and secure RFID security method with ownership transfer," in Int'tl Conf. Computational Intelligence and Security, 2006, pp. 1090-1095.
-
(2006)
Int'tl Conf. Computational Intelligence and Security
, pp. 1090-1095
-
-
Osaka, K.1
Takagi, T.2
Yamazaki, K.3
Takahashi, O.4
-
5
-
-
84977783611
-
Strong and robust RFID authentication enabling perfect ownership transfer
-
Conference on Information and Communications Security, ICICS06;
-
C. H. Lim and T. Kwon, "Strong and robust RFID authentication enabling perfect ownership transfer," in Conference on Information and Communications Security -- ICICS06; Lecture Notes in Computer Science, 2006.
-
(2006)
Lecture Notes in Computer Science
-
-
Lim, C.H.1
Kwon, T.2
-
6
-
-
35248846439
-
POP method: An approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism
-
K. H. S. S. Koralalage, S. M. Reza, J. Miura, Y. Goto, and J. Cheng, "POP method: An approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism," in Proc. ACM Symposium on Applied Computing (SAC), 2007, pp. 270-275.
-
(2007)
Proc. ACM Symposium on Applied Computing (SAC)
, pp. 270-275
-
-
Koralalage, K.H.S.S.1
Reza, S.M.2
Miura, J.3
Goto, Y.4
Cheng, J.5
-
10
-
-
1542487484
-
Cellular security: Better, but foes still lurk
-
M. J. Riezenman, "Cellular security: better, but foes still lurk," IEEE Spectrum, vol. 37, pp. 39-42, 2000.
-
(2000)
IEEE Spectrum
, vol.37
, pp. 39-42
-
-
Riezenman, M.J.1
-
11
-
-
24344507334
-
Remote physical device fingerprinting
-
T. Kohno, A. Broido and K. C. Claffy, "Remote physical device fingerprinting," IEEE trans. Dependable and Secure Computing, vol. 2, pp. 93-108, 2005.
-
(2005)
IEEE trans. Dependable and Secure Computing
, vol.2
, pp. 93-108
-
-
Kohno, T.1
Broido, A.2
Claffy, K.C.3
-
13
-
-
11144331561
-
Enhancing intrusion detection in wireless networks using radio frequency fingerprinting
-
St. Thomas, US Virgin Islands, November 22-24
-
J. Hall, M. Barbeau and E. Kranakis, "Enhancing intrusion detection in wireless networks using radio frequency fingerprinting," in Proc. Communications, Internet and Information Technology (CIIT), St. Thomas, US Virgin Islands, November 22-24, 2004.
-
(2004)
Proc. Communications, Internet and Information Technology (CIIT)
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
14
-
-
51349157157
-
Implications of radio fingerprinting on the security of sensor networks
-
Nice, France, Sep. 17-20
-
K. B. Rasmussen and S. Capkun, "Implications of radio fingerprinting on the security of sensor networks," in Proc. Int'l Conf. Security and Privacy in Communication Networks (Securecomm), Nice, France, Sep. 17-20, 2007.
-
(2007)
Proc. Int'l Conf. Security and Privacy in Communication Networks (Securecomm)
-
-
Rasmussen, K.B.1
Capkun, S.2
-
17
-
-
50249134033
-
Initial SRAM state as a fingerprint and source of true random numbers for RFID tags
-
D. E. Holcomb, W. P. Burleson and K. Fu, "Initial SRAM state as a fingerprint and source of true random numbers for RFID tags," in Proc. Conf. RFID Security, 2007.
-
(2007)
Proc. Conf. RFID Security
-
-
Holcomb, D.E.1
Burleson, W.P.2
Fu, K.3
-
18
-
-
84857114308
-
-
Available
-
Avery Dennison RFID. Available: http://www.rfid.averydennison.com
-
-
-
-
19
-
-
62749108355
-
-
RFID Research Center, University of Arkansas. Available: http://itri.uark.edu/rfid/
-
RFID Research Center, University of Arkansas. Available: http://itri.uark.edu/rfid/
-
-
-
|