-
1
-
-
33745621564
-
Reducing time complexity in RFID systems
-
Proceedings of the 12th Annual Workshop on Selected Areas in Cryptography, Canada Kingston, Canada
-
G. Avoine, E. Dysli, and P. Oechslin. Reducing time complexity in RFID systems. In Proceedings of the 12th Annual Workshop on Selected Areas in Cryptography, Canada Kingston, Canada, LNCS 3897, pp. 291-306, 2005.
-
(2005)
LNCS
, vol.3897
, pp. 291-306
-
-
Avoine, G.1
Dysli, E.2
Oechslin, P.3
-
2
-
-
33745926180
-
New security problem in RFID systems tag killing
-
Proceedings of International Conference on Applied Cryptography and Information Security, Glasgow, UK
-
D.G. Han, T. Takagi, H.W. Kim, and K.I. Chung. New security problem in RFID systems tag killing. In Proceedings of International Conference on Applied Cryptography and Information Security, Glasgow, UK, LNCS 3982, pp. 375-384, 2006.
-
(2006)
LNCS
, vol.3982
, pp. 375-384
-
-
Han, D.G.1
Takagi, T.2
Kim, H.W.3
Chung, K.I.4
-
3
-
-
25444508507
-
Low-cost RFID privacy protection scheme
-
S. Kinoshita, F. Hoshino, T. Komuro, A. Fujimura, and M. Ohkubo. Low-cost RFID privacy protection scheme. Transactions of Information Processing Society of Japan, vol. 45, no. 8, pp. 2007-2021, 2004.
-
(2004)
Transactions of Information Processing Society of Japan
, vol.45
, Issue.8
, pp. 2007-2021
-
-
Kinoshita, S.1
Hoshino, F.2
Komuro, T.3
Fujimura, A.4
Ohkubo, M.5
-
4
-
-
47349090633
-
Enhancement of the mutual authentication protocol on RFID passive tag
-
Kaohsiung, Taiwan, Nov
-
K.C. Liu, H.W. Wang, and H.F. Huang. Enhancement of the mutual authentication protocol on RFID passive tag. In Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, Taiwan, vol. 1, pp. 261-264, Nov. 2007.
-
(2007)
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing
, vol.1
, pp. 261-264
-
-
Liu, K.C.1
Wang, H.W.2
Huang, H.F.3
-
6
-
-
85012989086
-
An efficient and secure RFID security method with ownership transfer
-
Guangzhou, China, Nov
-
K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi. An efficient and secure RFID security method with ownership transfer. In Proceedings of International Conference on Computational Intelligence and Security, Guangzhou, China, vol. 2, pp. 1090-1095, Nov. 2006.
-
(2006)
Proceedings of International Conference on Computational Intelligence and Security
, vol.2
, pp. 1090-1095
-
-
Osaka, K.1
Takagi, T.2
Yamazaki, K.3
Takahashi, O.4
-
7
-
-
33947538532
-
Protocols for RFID tag/reader authentication
-
Apr
-
S. Piramuthu. Protocols for RFID tag/reader authentication. Decision Support Systems, vol. 43, no. 3, pp. 897-914, Apr. 2007.
-
(2007)
Decision Support Systems
, vol.43
, Issue.3
, pp. 897-914
-
-
Piramuthu, S.1
-
8
-
-
24644501824
-
Challenge-response based RFID authentication protocol for distributed database environment
-
Proceedings of the 2nd International Conference on Security in Pervasive Computing, Boppard, Germany
-
K. Rhee, J. Kwak, S. Kim, and D. Won. Challenge-response based RFID authentication protocol for distributed database environment. In Proceedings of the 2nd International Conference on Security in Pervasive Computing, Boppard, Germany, LNCS 3450, pp. 70-84, 2005.
-
(2005)
LNCS
, vol.3450
, pp. 70-84
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
Won, D.4
-
9
-
-
38949212887
-
Owner transferable privacy protection scheme for RFID tags
-
J. Saito and K. Sakurai. Owner transferable privacy protection scheme for RFID tags. Joho Shori Gakkai Shinpojiumu Ronbunshu, vol. 2005, no. 13, pp. 283-288, 2005.
-
(2005)
Joho Shori Gakkai Shinpojiumu Ronbunshu
, vol.2005
, Issue.13
, pp. 283-288
-
-
Saito, J.1
Sakurai, K.2
-
10
-
-
0003855464
-
-
2nd Edition. John Wiley and Sons, New York
-
B. Schneier. Applied Cryptography. 2nd Edition. John Wiley and Sons, New York, 1996.
-
(1996)
Applied Cryptography
-
-
Schneier, B.1
-
11
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Proceedings of the 1st International Conference on Security in Pervasive Computing, Boppard, Germany
-
S.A. Weis, S. Sarma, R. Rivest, and D. Engels. Security and privacy aspects of low-cost radio frequency identification systems. In Proceedings of the 1st International Conference on Security in Pervasive Computing, Boppard, Germany, LNCS 2802, pp. 201-212, 2003.
-
(2003)
LNCS
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.2
Rivest, R.3
Engels, D.4
|