-
2
-
-
26444443915
-
A scalable and provably secure hash based RFID protocol
-
Proceedings of Pervasive Computing and Communication Security (PerSec 2005)
-
Avoine G., and Oechslin P. A scalable and provably secure hash based RFID protocol. Proceedings of Pervasive Computing and Communication Security (PerSec 2005). IEEE Computer Society (2005) 110-114
-
(2005)
IEEE Computer Society
, pp. 110-114
-
-
Avoine, G.1
Oechslin, P.2
-
3
-
-
33847330246
-
A lightweight RFID protocol to protect against traceability and cloning attacks
-
IEEE Prss
-
Dimitriou T. A lightweight RFID protocol to protect against traceability and cloning attacks. Proceedings of SECURECOMM'05 (2005), IEEE Prss 59-66
-
(2005)
Proceedings of SECURECOMM'05
, pp. 59-66
-
-
Dimitriou, T.1
-
6
-
-
35048899238
-
Universal re-encryption for Mixnets
-
Springer-Verlag
-
Golle P., Jakobsson M., Juels A., and Syverson P. Universal re-encryption for Mixnets. Proceedings of CT-RSA 2004, LNCS 2964 (2004), Springer-Verlag 163-178
-
(2004)
Proceedings of CT-RSA 2004, LNCS 2964
, pp. 163-178
-
-
Golle, P.1
Jakobsson, M.2
Juels, A.3
Syverson, P.4
-
8
-
-
34748848124
-
Universally Composable and Forward Secure RFID Authentication and Authenticated Key Exchange
-
To appear
-
T. Le, M. Burmester, and B. Medeiros, Universally Composable and Forward Secure RFID Authentication and Authenticated Key Exchange, In Proceedings of ACM Symposium on Information, Computer and Communications Security, March 2007, To appear.
-
(2007)
Proceedings of ACM Symposium on Information, Computer and Communications Security, March
-
-
Le, T.1
Burmester, M.2
Medeiros, B.3
-
9
-
-
2942625823
-
Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers
-
IEEE Computer Society
-
Henrici D., and Muller P. Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers. Proceedings of Pervasive Computing and Communications Security (PerSec 2004) (2004), IEEE Computer Society 149-153
-
(2004)
Proceedings of Pervasive Computing and Communications Security (PerSec 2004)
, pp. 149-153
-
-
Henrici, D.1
Muller, P.2
-
11
-
-
33144457479
-
RFID security and privacy: a research survey
-
IEEE Press
-
Juels A. RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications vol. 24(2) (2006), IEEE Press 381-394
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24 2
, pp. 381-394
-
-
Juels, A.1
-
12
-
-
33745597876
-
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
-
Springer-Verlag
-
Molnar D., Soppera A., and Wagner D. A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In Proceedings of Selected Areas in Cryptography (SAC 2005), LNCS 3897 (2005), Springer-Verlag 276-290
-
(2005)
In Proceedings of Selected Areas in Cryptography (SAC 2005), LNCS 3897
, pp. 276-290
-
-
Molnar, D.1
Soppera, A.2
Wagner, D.3
-
14
-
-
0003614758
-
Digitalized signatures and public-key functions as intractable as factorization
-
MIT, Cambridge, MA, USA
-
Rabin M. Digitalized signatures and public-key functions as intractable as factorization. Technical report (1979), MIT, Cambridge, MA, USA
-
(1979)
Technical report
-
-
Rabin, M.1
-
16
-
-
84948964832
-
Memory efficient variants of public-key schemes for smart card applications
-
Springer-Verlag
-
Shamir A. Memory efficient variants of public-key schemes for smart card applications. Proceedings of EUROCRYPT '94, LNCS 950 (1995), Springer-Verlag 445-449
-
(1995)
Proceedings of EUROCRYPT '94, LNCS 950
, pp. 445-449
-
-
Shamir, A.1
-
17
-
-
50249161524
-
SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices such as RFID tags
-
Proceedings of FSE, Springer-Verlag GmbH, To Appear
-
A. Shamir, SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices such as RFID tags. In Proceedings of FSE 2008, Lecture Notes in Computer Science. Springer-Verlag GmbH, To Appear.
-
(2008)
Lecture Notes in Computer Science
-
-
Shamir, A.1
|