-
2
-
-
34250340562
-
Pervasive Pheromone-based Interactions with RFID Tags
-
June
-
M. Mamei, F. Zambonelli, "Pervasive Pheromone-based Interactions with RFID Tags", ACM Transactions on Autonomous and Adaptive Systems, Vol. 2 , Iss. 2, June 2007.
-
(2007)
ACM Transactions on Autonomous and Adaptive Systems
, vol.2
, Issue.ISS. 2
-
-
Mamei, M.1
Zambonelli, F.2
-
3
-
-
34547617684
-
Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments
-
P. Robinson and M. Beigl, "Trust Context Spaces: an Infrastructure for Pervasive Security in Context-Aware Environments", in Proceedings of SPC, 2003.
-
(2003)
Proceedings of SPC
-
-
Robinson, P.1
Beigl, M.2
-
4
-
-
35348853264
-
Securing Pocket Hard Drives
-
October
-
N. Ravi, C. Narayanaswami, M. T. Raghunath, M. C. Rosu, "Securing Pocket Hard Drives", IEEE Pervasive Computing, Vol. 6 , Iss. 4, October 2007, pp. 18-23.
-
(2007)
IEEE Pervasive Computing
, vol.6
, Issue.ISS. 4
, pp. 18-23
-
-
Ravi, N.1
Narayanaswami, C.2
Raghunath, M.T.3
Rosu, M.C.4
-
5
-
-
36349008689
-
Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks
-
December
-
W. Gu, X. Bai, S. Chellappan, D. Xuan and W. Jia, "Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks", IEEE Transactions on Parallel and Distributed Systems, Vol. 18, No. 12, December 2007, pp. 1784-1796.
-
(2007)
IEEE Transactions on Parallel and Distributed Systems
, vol.18
, Issue.12
, pp. 1784-1796
-
-
Gu, W.1
Bai, X.2
Chellappan, S.3
Xuan, D.4
Jia, W.5
-
6
-
-
34548310312
-
Cluster-Based Forwarding for Reliable End-to-End Delivery in Wireless Sensor Networks
-
Q. Cao, T. Abdelzaher, T. He, and R. Kravets, "Cluster-Based Forwarding for Reliable End-to-End Delivery in Wireless Sensor Networks", in Proceedings of INFOCOM, 2007.
-
(2007)
Proceedings of INFOCOM
-
-
Cao, Q.1
Abdelzaher, T.2
He, T.3
Kravets, R.4
-
7
-
-
51349154747
-
An Information Model for Geographic Greedy Forwarding in Wireless Ad-Hoc Sensor Networks
-
Z. Jiang, J. Ma, W. Lou, and J. Wu, "An Information Model for Geographic Greedy Forwarding in Wireless Ad-Hoc Sensor Networks", in Proceedings of INFOCOM, 2008.
-
(2008)
Proceedings of INFOCOM
-
-
Jiang, Z.1
Ma, J.2
Lou, W.3
Wu, J.4
-
8
-
-
33750353849
-
A Secure and Efficient RFID Protocol that Could make Big Brother (partially) Obsolete
-
T. Dimitriou, "A Secure and Efficient RFID Protocol that Could make Big Brother (partially) Obsolete", in Proceedings of IEEE PerCom, 2006.
-
(2006)
Proceedings of IEEE PerCom
-
-
Dimitriou, T.1
-
9
-
-
34547617482
-
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
-
L. Lu, J. Han, L. Hu, Y. Liu, and L. M. Ni, "Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems", in Proceedings of IEEE PerCom, 2007.
-
(2007)
Proceedings of IEEE PerCom
-
-
Lu, L.1
Han, J.2
Hu, L.3
Liu, Y.4
Ni, L.M.5
-
11
-
-
38149058455
-
-
LASEC Security and Cryptography Laboratory, available online at, 2007
-
G. Avoine, "Bibliography on Security and Privacy in RFID Systems", LASEC Security and Cryptography Laboratory, available online at http://lasecwww.epfl.ch/̃gavoine/rfid, 2007.
-
Bibliography on Security and Privacy in RFID Systems
-
-
Avoine, G.1
-
12
-
-
58049141225
-
From Identification to Authentication - A Review of RFID Product Authentication Techniques
-
RFIDSec
-
M. Lehtonen, T. Staake, F. Michahelles, and E. Fleisch, "From Identification to Authentication - A Review of RFID Product Authentication Techniques", in Proceedings of Workshop on RFID Security (RFIDSec), 2006.
-
(2006)
Proceedings of Workshop on RFID Security
-
-
Lehtonen, M.1
Staake, T.2
Michahelles, F.3
Fleisch, E.4
-
13
-
-
33749408130
-
Cryptography in Radio Frequency Identification and Fair Exchange Protocols
-
Ph.D. thesis, EPFL, Lausanne, Switzerland
-
G. Avoine, "Cryptography in Radio Frequency Identification and Fair Exchange Protocols", Ph.D. thesis, EPFL, Lausanne, Switzerland, 2005.
-
(2005)
-
-
Avoine, G.1
-
14
-
-
33144457479
-
RFID Security and Privacy: A Research Survey
-
A. Juels, "RFID Security and Privacy: a Research Survey", Selected Areas in Communication, IEEE Journal on, Vol. 24, No. 2, 2006, pp. 381-394.
-
(2006)
Selected Areas in Communication, IEEE Journal on
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
15
-
-
70349368349
-
RFID in Pervasive Computing: State-of-the-art and Outlook
-
Elsevier
-
G. Roussos and V. Kostakos, "RFID in Pervasive Computing: State-of-the-art and Outlook", Pervasive and Mobile Computing, Elsevier, 2008.
-
(2008)
Pervasive and Mobile Computing
-
-
Roussos, G.1
Kostakos, V.2
-
16
-
-
21144438831
-
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
-
S. Weis, S. Sarma, R. Rivest and D. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", in Proceedings of SPC, 2003.
-
(2003)
Proceedings of SPC
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
17
-
-
34547639877
-
Efficient Hash-Chain based RFID Privacy Protection Scheme
-
M. Ohkubo, K. Suzuki, and S. Kinoshita, "Efficient Hash-Chain based RFID Privacy Protection Scheme", in Proceedings of UbiComp, Workshop Privacy, 2004.
-
(2004)
Proceedings of UbiComp, Workshop Privacy
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
19
-
-
2942625823
-
Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices Using Varying Identifiers
-
D. Henrici and P. Müller, "Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices Using Varying Identifiers", in Proceedings of Pervasive Computing and Communications Workshops, 2004.
-
(2004)
Proceedings of Pervasive Computing and Communications Workshops
-
-
Henrici, D.1
Müller, P.2
-
20
-
-
20844453821
-
Minimalist Cryptography for Low-Cost RFID Tags
-
A. Juels, "Minimalist Cryptography for Low-Cost RFID Tags", in Proceedings of SCN, 2004.
-
(2004)
Proceedings of SCN
-
-
Juels, A.1
-
21
-
-
34547626956
-
A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks
-
T. Dimitriou, "A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks", in Proceedings of SecureComm, 2005.
-
(2005)
Proceedings of SecureComm
-
-
Dimitriou, T.1
-
22
-
-
49149085742
-
Providing Security and Privacy in RFID Systems Using Triggered Hash Chains
-
D Henrici, P Müller, "Providing Security and Privacy in RFID Systems Using Triggered Hash Chains", in Proceedings of IEEE PerCom, 2008.
-
(2008)
Proceedings of IEEE PerCom
-
-
Henrici, D.1
Müller, P.2
-
23
-
-
14844294769
-
Privacy and Security in Library RFID: Issues, Practices, and Architectures
-
D. Molnar and D. Wagner, "Privacy and Security in Library RFID: Issues, Practices, and Architectures", in Proceedings of ACM CCS, 2004.
-
(2004)
Proceedings of ACM CCS
-
-
Molnar, D.1
Wagner, D.2
-
24
-
-
47649131906
-
Storage-Awareness: RFID Private Authentication based on Sparse Tree
-
W. Wang, Y. Li, L. Hu, L. Lu, "Storage-Awareness: RFID Private Authentication based on Sparse Tree", in Proceedings of Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007.
-
(2007)
Proceedings of Security, Privacy and Trust in Pervasive and Ubiquitous Computing
-
-
Wang, W.1
Li, Y.2
Hu, L.3
Lu, L.4
-
25
-
-
49149091904
-
Randomized Bit Encoding for Stronger Backward Channel Protection
-
T. L. Lim, T. Li, and S. L. Yeo , "Randomized Bit Encoding for Stronger Backward Channel Protection", in Proceedings of IEEE PerCom, 2008.
-
(2008)
Proceedings of IEEE PerCom
-
-
Lim, T.L.1
Li, T.2
Yeo, S.L.3
-
26
-
-
34548180384
-
A Scalable, Delegatable Pseudonym Protocol Enabling Owner-ship Transfer of RFID Tags
-
D. Molnar, A. Soppera, and D. Wagner, "A Scalable, Delegatable Pseudonym Protocol Enabling Owner-ship Transfer of RFID Tags", in Proceedings of SAC, 2005.
-
(2005)
Proceedings of SAC
-
-
Molnar, D.1
Soppera, A.2
Wagner, D.3
-
29
-
-
51349086896
-
Towards Statistically Strong Source Anonymity for Sensor Networks
-
M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards Statistically Strong Source Anonymity for Sensor Networks", in Proceedings of INFOCOM, 2008.
-
(2008)
Proceedings of INFOCOM
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
|