-
1
-
-
35248817849
-
The EM side-channel(s)
-
D. Agrawal, B. Archambeault, J. R. Rao, and P. Rohatgi. The EM side-channel(s). In CHES, pages 29-45, 2002.
-
(2002)
CHES
, pp. 29-45
-
-
Agrawal, D.1
Archambeault, B.2
Rao, J.R.3
Rohatgi, P.4
-
4
-
-
33751546328
-
Mutual authentication protocol for RFID conforming to epc class 1 generation 2 standards
-
H.-Y. Chien and C.-H. Chen. Mutual authentication protocol for RFID conforming to epc class 1 generation 2 standards. Computer Standards Interfaces, 29(2):254-259, 2007.
-
(2007)
Computer Standards Interfaces
, vol.29
, Issue.2
, pp. 254-259
-
-
Chien, H.-Y.1
Chen, C.-H.2
-
5
-
-
33847330246
-
A lightweight RFID protocol to protect against traceability and cloning attacks
-
T. Dimitriou. A lightweight RFID protocol to protect against traceability and cloning attacks. In SecureComm, pages 59-66, 2005.
-
(2005)
SecureComm
, pp. 59-66
-
-
Dimitriou, T.1
-
7
-
-
33751513718
-
Enhancing security of epcglobal gen-2 RFID tag against traceability and cloning
-
D. N. Duc, J. Park, H. Lee, and K. Kim. Enhancing security of epcglobal gen-2 RFID tag against traceability and cloning. In SCIS, 2006.
-
(2006)
SCIS
-
-
Duc, D.N.1
Park, J.2
Lee, H.3
Kim, K.4
-
9
-
-
59249097693
-
A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags
-
S. Fouladgar and H. Afifi. A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags. JCM, 2(6):6-13, 2007.
-
(2007)
JCM
, vol.2
, Issue.6
, pp. 6-13
-
-
Fouladgar, S.1
Afifi, H.2
-
10
-
-
2942625823
-
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
-
D. Henrici and P. Müller. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In PerSec, pages 149-153, 2004.
-
(2004)
PerSec
, pp. 149-153
-
-
Henrici, D.1
Müller, P.2
-
11
-
-
34748832806
-
Defining Strong Privacy for RFID. Cryptology ePrint Archive
-
Report 2006/137
-
A. Juels and S. Weis. Defining Strong Privacy for RFID. Cryptology ePrint Archive, Report 2006/137, 2006.
-
(2006)
-
-
Juels, A.1
Weis, S.2
-
12
-
-
34748921704
-
Protecting RFID Communications in Supply Chains
-
Singapore, ACM
-
Y. Li and X. Ding. Protecting RFID Communications in Supply Chains. In ASIACCS '07, pages 234-241, Singapore, 2007. ACM.
-
(2007)
ASIACCS '07
, pp. 234-241
-
-
Li, Y.1
Ding, X.2
-
13
-
-
84977783611
-
Strong and robust RFID authentication enabling perfect ownership transfer
-
C. H. Lim and T. Kwon. Strong and robust RFID authentication enabling perfect ownership transfer. In ICICS, pages 1-20, 2006.
-
(2006)
ICICS
, pp. 1-20
-
-
Lim, C.H.1
Kwon, T.2
-
14
-
-
33745597876
-
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
-
D. Molnar, A. Soppera, and D. Wagner. A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In Selected Areas in Cryptography, pages 276-290, 2005.
-
(2005)
Selected Areas in Cryptography
, pp. 276-290
-
-
Molnar, D.1
Soppera, A.2
Wagner, D.3
-
15
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
D. Molnar and D. Wagner. Privacy and security in library RFID: issues, practices, and architectures. In ACM CCS, pages 210-219, 2004.
-
(2004)
ACM CCS
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
17
-
-
38349066494
-
An efficient and secure RFID security method with ownership transfer
-
K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi. An efficient and secure RFID security method with ownership transfer. In CIS, pages 778-787, 2006.
-
(2006)
CIS
, pp. 778-787
-
-
Osaka, K.1
Takagi, T.2
Yamazaki, K.3
Takahashi, O.4
-
18
-
-
33744928896
-
Reassignment scheme of an RFID tag's key for owner transfer
-
J. Saito, K. Imamoto, and K. Sakurai. Reassignment scheme of an RFID tag's key for owner transfer. In EUC Workshops, pages 1303-1312, 2005.
-
(2005)
EUC Workshops
, pp. 1303-1312
-
-
Saito, J.1
Imamoto, K.2
Sakurai, K.3
-
20
-
-
56749103027
-
RFID authentication protocol for low-cost tags
-
B. Song and C. J. Mitchell. RFID authentication protocol for low-cost tags. In WISEC, pages 140-147, 2008.
-
(2008)
WISEC
, pp. 140-147
-
-
Song, B.1
Mitchell, C.J.2
-
21
-
-
65649089378
-
Attacks on RFID protocols. Cryptology ePrint Archive
-
Report 2008/310
-
T. van Deursen and S. Radomirovic. Attacks on RFID protocols. Cryptology ePrint Archive, Report 2008/310, 2008.
-
(2008)
-
-
van Deursen, T.1
Radomirovic, S.2
-
22
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels. Security and privacy aspects of low-cost radio frequency identification systems. In SPC, pages 201-212, 2003.
-
(2003)
SPC
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
|