-
1
-
-
0001853125
-
-
Scientific American, Jan
-
Mark Weiser, "The computer of the 21st century," in Scientific American, Jan, 265(3), pp. 94-104, 1992.
-
(1992)
The computer of the 21st century
, vol.265
, Issue.3
, pp. 94-104
-
-
Weiser, M.1
-
2
-
-
84877887414
-
Security Analysis of a Cryptographically-Enabled RFID Device
-
Stephen C. Bono, Matthew Green, Adam Stubblefield, Ari Juels, Aviel D. Rubin, Michael Szydlo. "Security Analysis of a Cryptographically-Enabled RFID Device." In 14th USENIX Security Symposium, 2005
-
(2005)
14th USENIX Security Symposium
-
-
Bono, S.C.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.D.5
Szydlo, M.6
-
5
-
-
70249113279
-
RFID Security: Attacks and countermeasures
-
Paris Yan, Kitsos Zhang eds, Springer Verlag
-
Tassos Dimitriou, "RFID Security: Attacks and countermeasures," Book Chapter in RFID Security: Techniques, Protocols and System-On-Chip Design, Paris Kitsos, Yan Zhang (eds), Springer Verlag, 2008.
-
(2008)
Book Chapter in RFID Security: Techniques, Protocols and System-On-Chip Design
-
-
Dimitriou, T.1
-
7
-
-
70249106292
-
-
M. Feldhofer, J. Wolkerstorfer, and V. Rijmen. AES Implementation on a grain of sand, In Information Security, IEE proceedings, 152(1):13-20, October 2005.
-
M. Feldhofer, J. Wolkerstorfer, and V. Rijmen. "AES Implementation on a grain of sand," In Information Security, IEE proceedings, 152(1):13-20, October 2005.
-
-
-
-
8
-
-
70249111403
-
Energy comparison of AES and SHA-1 for ubiquitous computing
-
P. Kaps and B. Sunar, "Energy comparison of AES and SHA-1 for ubiquitous computing," In EUCŠ06.
-
EUCŠ06
-
-
Kaps, P.1
Sunar, B.2
-
10
-
-
70249119906
-
-
David Molnar, Andrea Soppera and David Wagner, A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags, in SAC, 2005.
-
David Molnar, Andrea Soppera and David Wagner, "A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags," in SAC, 2005.
-
-
-
-
13
-
-
0348167857
-
-
Roy Want. RFID: A Key to Automating Everything, In Scientific American, Jan, 290(1), pp. 56-65, 2004 1.
-
Roy Want. "RFID: A Key to Automating Everything," In Scientific American, Jan, 290(1), pp. 56-65, 2004 1.
-
-
-
-
14
-
-
70249126818
-
-
Nokia unveils RFID phone reader, IN RFID Journal, 17 March 2004. http://www.rfidjournal.com/article/view/834.
-
"Nokia unveils RFID phone reader," IN RFID Journal, 17 March 2004. http://www.rfidjournal.com/article/view/834.
-
-
-
-
15
-
-
70249112526
-
-
http://www.nfc-forum.org
-
-
-
-
16
-
-
14844290165
-
Enhancing RFID privacy through antenna energy analysis
-
Kenneth Fishkin and Sumit Roy, "Enhancing RFID privacy through antenna energy analysis," In MIT RFID Privacy Workshop, 2003.
-
(2003)
MIT RFID Privacy Workshop
-
-
Fishkin, K.1
Roy, S.2
-
19
-
-
33744957484
-
Adversary Model for Radio Frequency Identification
-
Gildas Avoine. "Adversary Model for Radio Frequency Identification," in Cryptology ePrint archive, www.iacr.org
-
Cryptology ePrint archive
-
-
Avoine, G.1
-
20
-
-
70249125705
-
-
Ivan Damgård and Michael Østergaard Pedersen. RFID Security: Tradeoffs between Security and Efficiency, in Cryptology ePrint archive, www.iacr.org, July 2006.
-
Ivan Damgård and Michael Østergaard Pedersen. "RFID Security: Tradeoffs between Security and Efficiency," in Cryptology ePrint archive, www.iacr.org, July 2006.
-
-
-
-
21
-
-
35248891000
-
Forward Security in Private-Key Cryptography
-
Topics in Cryptology-CT-RSA 03, M. Joye ed, Springer-Verlag
-
Mihir Bellare and Bennet Yee. "Forward Security in Private-Key Cryptography", in Topics in Cryptology-CT-RSA 03, Lecture Notes in Computer Science Vol. 2612, M. Joye ed., Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2612
-
-
Bellare, M.1
Yee, B.2
-
22
-
-
85012989086
-
An Efficient and Secure RFID Security Method with Ownership Transfer,
-
K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi. "An Efficient and Secure RFID Security Method with Ownership Transfer, "in IEEE Intern. Conf. on Computational Intelligence and Security (CIS'06), 2006.
-
(2006)
IEEE Intern. Conf. on Computational Intelligence and Security (CIS'06)
-
-
Osaka, K.1
Takagi, T.2
Yamazaki, K.3
Takahashi, O.4
-
25
-
-
26444435642
-
RFID Guardian: A Battery-powered Mobile Device for RFID Privacy Management
-
Australasian Conference on information Security and Privacy, ACISP 2005, of, July
-
M. Rieback, B. Crispo, and A. Tanenbaum, "RFID Guardian: A Battery-powered Mobile Device for RFID Privacy Management," in Australasian Conference on information Security and Privacy - ACISP 2005, vol. 3574 of LNCS, pp. 184-194, July 2005.
-
(2005)
LNCS
, vol.3574
, pp. 184-194
-
-
Rieback, M.1
Crispo, B.2
Tanenbaum, A.3
|