-
1
-
-
33845531085
-
Radio frequency identification: Adversary model and attacks on existing protocols
-
Swiss Federal Institute of Technology in Lausanne
-
G. Avoine. Radio Frequency Identification: Adversary Model and Attacks on Existing Protocols. Technical report, Technical Report LASECREPORT-2005-001, Swiss Federal Institute of Technology in Lausanne, 2005.
-
(2005)
Technical report, Technical Report LASECREPORT-2005-001
-
-
Avoine, G.1
-
2
-
-
84877887414
-
Security analysis of a cryptographically-enabled RFID device
-
S. Bono, M. Green, A. Stubblefield, A. Juels, A. Rubin, and M. Szydlo. Security Analysis of a Cryptographically-Enabled RFID Device. 14th USENIX Security Symposium, pages 1-16, 2005.
-
(2005)
14th USENIX Security Symposium
, pp. 1-16
-
-
Bono, S.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.5
Szydlo, M.6
-
3
-
-
33845920117
-
HB++: a lightweight authentication protocol secure against some attacks
-
J. Bringer, H. Chabanne, and E. Dottax. HB++: a lightweight authentication protocol secure against some attacks. Proc. of SecPerU06, pages 28-33.
-
Proc. of SecPerU06
, pp. 28-33
-
-
Bringer, J.1
Chabanne, H.2
Dottax, E.3
-
5
-
-
36248982045
-
SASI: A new ultra-lightweight RFID authentication protocol providing strong authentication and strong integrity
-
E. Courses and T. Surveys. SASI: A New Ultra-lightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. Transactions on Dependable and Secure Computing, 4(4):337-340, 2007.
-
(2007)
Transactions on Dependable and Secure Computing
, vol.4
, Issue.4
, pp. 337-340
-
-
Courses, E.1
Surveys, T.2
-
9
-
-
24944582157
-
Efficient authentication for low-cost RFID systems
-
Computational Science and Its Applications - ICCSA 2005: International Conference, Proceeedings
-
S.M. Lee, Y.J. Hwang, D.H. Lee, and J.I. Lim. Efficient authentication for low-cost RFID systems. International Conference on Computational Science and its Applications-ICCSA, pages 619-627, 2005. (Pubitemid 41313878)
-
(2005)
Lecture Notes in Computer Science
, vol.3480
, Issue.3
, pp. 619-627
-
-
Lee, S.M.1
Hwang, Y.J.2
Lee, D.H.3
Lim, J.I.4
-
11
-
-
57849147967
-
Security analysis of two ultra-lightweight RFID authentication protocols
-
T. Li and G. Wang. Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols. IFIP SEC, 2007.
-
(2007)
IFIP SEC
-
-
Li, T.1
Wang, G.2
-
12
-
-
14844294769
-
Privacy and security in library RFID issues, practices, and architectures
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
D. Molnar and D. Wagner. Privacy and security in library RFID: issues, practices, and architectures. Proceedings of the 11th ACM conference on Computer and communications security, pages 210-219, 2004. (Pubitemid 40338202)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
17
-
-
33750290259
-
YA-TRAP: Yet another trivial RFID authentication protocol
-
DOI 10.1109/PERCOMW.2006.152, 1599066, Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
-
G. Tsudik. YA-TRAP: Yet Another Trivial RFID Authentication Protocol. Pervasive Computing and Communications Workshops, 2006. PerCom Workshops 2006. Fourth Annual IEEE International Conference on, pages 640-643, 2006. (Pubitemid 44612661)
-
(2006)
Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
, vol.2006
, pp. 640-643
-
-
Tsudik, G.1
-
18
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
S.A. Weis, S.E. Sarma, R.L. Rivest, and D.W. Engels. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. Security in Pervasive Computing, pages 201-212, 2003.
-
(2003)
Security in Pervasive Computing
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
|