-
1
-
-
84957018842
-
Low cost attacks on tamper resistant devices
-
B. Christianson, B. Crispo, T. M. A. Lomas, & M. Roe (Eds.) Paris, France: Springer-Verlag
-
Anderson, R. J., & Kuhn, M. G. (1997) Low cost attacks on tamper resistant devices. In B. Christianson, B. Crispo, T. M. A. Lomas, & M. Roe (Eds.), Security Protocols, 5th International Workshop, Lecture Notes in Computer Science (Vol. 1361, pp. 125-136). Paris, France: Springer-Verlag.
-
(1997)
Security Protocols, 5th International Workshop, Lecture Notes in Computer Science
, vol.1361
, pp. 125-136
-
-
Anderson, R.J.1
Kuhn, M.G.2
-
2
-
-
26444478592
-
RFID traceability: A multilayer problem
-
A. Patrick & M. Yung (Eds.) Roseau, The Commonwealth Of Dominica, IFCA, Springer-Verlag
-
Avoine, G., & Oechslin, P. (2005). RFID traceability: A multilayer problem. In A. Patrick & M. Yung (Eds.), Financial cryptography - FC'05, Lecture Notes in Computer Science (Vol. 3570, pp. 125-140). Roseau, The Commonwealth Of Dominica, IFCA, Springer-Verlag.
-
(2005)
Financial Cryptography - FC'05, Lecture Notes in Computer Science
, vol.3570
, pp. 125-140
-
-
Avoine, G.1
Oechslin, P.2
-
3
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
M. Joye & J. J. Quisquater (Eds.) Boston, MA, USA: IACR, Springer-Verlag
-
Feldhofer, M., Dominikus, S., & Wolkerstorfer, J. (2004). Strong authentication for RFID systems using the AES algorithm. In M. Joye & J. J. Quisquater (Eds.), Workshop on Cryptographic Hardware and Embedded Systems - CHES 2004, Lecture Notes in Computer Science (Vol. 3156, pp. 357-370). Boston, MA, USA: IACR, Springer-Verlag.
-
(2004)
Workshop on Cryptographic Hardware and Embedded Systems - CHES 2004, Lecture Notes in Computer Science
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
6
-
-
35048899238
-
Universal re-encryption for mixnets
-
T. Okamoto (Ed.) San Francisco, CA, USA: Springer-Verlag
-
Golle, P., Jakobsson, M., Juels, A., & Syverson, P. (2004). Universal re-encryption for mixnets. In T. Okamoto (Ed.), The Cryptographers' Track at the RSA Conference - CT-RSA, Lecture Notes in Computer Science (Vol. 2964, pp. 163-178). San Francisco, CA, USA: Springer-Verlag.
-
(2004)
The Cryptographers' Track at the RSA Conference - CT-RSA, Lecture Notes in Computer Science
, vol.2964
, pp. 163-178
-
-
Golle, P.1
Jakobsson, M.2
Juels, A.3
Syverson, P.4
-
7
-
-
23944476196
-
Minimalist cryptography for low-cost RFID tags
-
C. Blundo S. Cimato (Eds.) Amalfi, Italia: Springer-Verlag
-
Juels, A. (2004). Minimalist cryptography for low-cost RFID tags. In C. Blundo & S. Cimato (Eds.), International Conference on Security in Communication Networks - SCN 2004, Lecture Notes in Computer Science (Vol. 3352, pp. 149-164). Amalfi, Italia: Springer-Verlag.
-
(2004)
International Conference on Security in Communication Networks - SCN 2004, Lecture Notes in Computer Science
, vol.3352
, pp. 149-164
-
-
Juels, A.1
-
8
-
-
30344451754
-
RFID security and privacy: A research survey
-
Juels, A. (2005). RFID security and privacy: A research survey. Manuscript.
-
(2005)
Manuscript
-
-
Juels, A.1
-
9
-
-
58049137086
-
High-power proxies for enhancing RFID privacy and utility
-
Dubrovnik, Croatia
-
Juels, A., Syverson, P., & Bailey, D. (2005). High-power proxies for enhancing RFID privacy and utility. In Workshop on Privacy Enhancing Technologies - PET 2005. Dubrovnik, Croatia.
-
(2005)
Workshop on Privacy Enhancing Technologies - PET 2005
-
-
Juels, A.1
Syverson, P.2
Bailey, D.3
-
10
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
V. Shoup (Ed.) Santa Barbara, CA, USA: IACR, Springer-Verlag
-
Juels, A., & Weis, S. (2005). Authenticating pervasive devices with human protocols. In: V. Shoup (Ed.), Advances in Cryptology - CRYPTO'05, Lecture Notes in Computer Science (Vol. 3126, pp. 293-308). Santa Barbara, CA, USA: IACR, Springer-Verlag.
-
(2005)
Advances in Cryptology - CRYPTO'05, Lecture Notes in Computer Science
, vol.3126
, pp. 293-308
-
-
Juels, A.1
Weis, S.2
-
12
-
-
33745803207
-
MARP: Mobile agent for rfid privacy protection
-
J. Domingo-Ferrer, J. Posegga, D. Schreckling (Eds.) Tarragona, Spain: IFIP, Springer-Verlag
-
Kim, S. C., Yeo, S. S., & Kim, S. K. (2006). MARP: Mobile agent for rfid privacy protection. In J. Domingo-Ferrer, J. Posegga, & D. Schreckling (Eds.), International Conference on Smart Card Research and Advanced Applications - CARDIS, Lecture Notes in Computer Science. Tarragona, Spain: IFIP, Springer-Verlag.
-
(2006)
International Conference on Smart Card Research and Advanced Applications - CARDIS, Lecture Notes in Computer Science
-
-
Kim, S.C.1
Yeo, S.S.2
Kim, S.K.3
-
14
-
-
24944575863
-
Cryptographic approach to "privacy-friendly" tags
-
MIT, MA, USA
-
Ohkubo, M., Suzuki, K., & Kinoshita, S. (2003). Cryptographic approach to "privacy-friendly" tags. In RFID Privacy Workshop. MIT, MA, USA.
-
(2003)
RFID Privacy Workshop
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
16
-
-
26444435642
-
RFID guardian: A battery-powered mobile device for RFID privacy management
-
C. Boyd & J. M. González Nieto (Eds.) Brisbane, Australia: Springer-Verlag
-
Rieback, M., Crispo, B., & Tanenbaum, A. (2005). RFID guardian: A battery-powered mobile device for RFID privacy management. In C. Boyd & J. M. González Nieto (Eds.), Australasian Conference on Information Security and Privacy - ACISP'05, Lecture Notes in Computer Science (Vol. 3574, pp. 184-194). Brisbane, Australia: Springer-Verlag.
-
(2005)
Australasian Conference on Information Security and Privacy - ACISP'05, Lecture Notes in Computer Science
, vol.3574
, pp. 184-194
-
-
Rieback, M.1
Crispo, B.2
Tanenbaum, A.3
-
17
-
-
85094317081
-
A platform for rfid security and privacy administration
-
Washington DC, USA
-
Rieback, M., Gaydadjiev, G., Crispo, B., Hofman, R., & Tanenbaum, A. (2006). A platform for rfid security and privacy administration. In USENIX/SAGE Large Installation System Administration Conference-LISA'06. Washington DC, USA.
-
(2006)
USENIX/SAGE Large Installation System Administration Conference-LISA'06
-
-
Rieback, M.1
Gaydadjiev, G.2
Crispo, B.3
Hofman, R.4
Tanenbaum, A.5
-
18
-
-
2942556410
-
Radio-frequency identification: Security risks and challenges
-
S. Sarma S. Weis D. Engels 2003 Radio-frequency identification: security risks and challenges Cryptobytes, RSA Laboratories 6 1 2 9
-
(2003)
Cryptobytes, RSA Laboratories
, vol.6
, Issue.1
, pp. 2-9
-
-
Sarma, S.1
Weis, S.2
Engels, D.3
-
19
-
-
33144480778
-
Security parallels between people and pervasive devices
-
IEEE, IEEE Computer Society Press, Kauai Island, Hawaii, USA
-
Weis, S. (2005). Security parallels between people and pervasive devices. In International Workshop on Pervasive Computing and Communication Security - PerSec 2005 (pp. 105-109). IEEE, IEEE Computer Society Press, Kauai Island, Hawaii, USA.
-
(2005)
International Workshop on Pervasive Computing and Communication Security - PerSec 2005
, pp. 105-109
-
-
Weis, S.1
-
20
-
-
21144438831
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Hutter, G. Müller, W. Stephan, M. Ullmann (Eds.) Boppard, Germany: Springer-Verlag
-
Weis, S., Sarma, S., Rivest, R., & Engels, D. (2003). Security and privacy aspects of low-cost radio frequency identification systems. In D. Hutter, G. Müller, W. Stephan, & M. Ullmann (Eds.), International Conference on Security in Pervasive Computing - SPC 2003, Lecture Notes in Computer Science (Vol. 2802, pp. 454-469). Boppard, Germany: Springer-Verlag.
-
(2003)
International Conference on Security in Pervasive Computing - SPC 2003, Lecture Notes in Computer Science
, vol.2802
, pp. 454-469
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
21
-
-
33745761701
-
Scalable and flexible privacy protection scheme for RFID systems
-
R. Molva, G. Tsudik, D. Westhoff (Eds.) Visegrad, Hungary: Springer-Verlag
-
Yeo, S. S., & Kim, S. K. (2005). Scalable and flexible privacy protection scheme for RFID systems. In R. Molva, G. Tsudik, & D. Westhoff (Eds.), European Workshop on Security and Privacy in Ad hoc and Sensor Networks - ESAS'05, Lecture Notes in Computer Science (Vol. 3813, pp. 153-163). Visegrad, Hungary: Springer-Verlag.
-
(2005)
European Workshop on Security and Privacy in Ad Hoc and Sensor Networks - ESAS'05, Lecture Notes in Computer Science
, vol.3813
, pp. 153-163
-
-
Yeo, S.S.1
Kim, S.K.2
-
22
-
-
38149104634
-
Forward secure privacy protection scheme for rfid system using advanced encryption standard
-
P. Thulasiraman, X. He, T. L. Xu, M. K. Denko, R. K. Thulasiram, L. T. Yang (Eds.) Niagara Falls, Canada: Springer
-
Yeo, S. S., Sakurai, K., Cho, S., Yang, K., & Kim, S. K. (2007). Forward secure privacy protection scheme for rfid system using advanced encryption standard. In P. Thulasiraman, X. He, T. L. Xu, M. K. Denko, R. K. Thulasiram, & L. T. Yang (Eds.), ISPA Workshops, Lecture Notes in Computer Science (Vol. 4743, pp. 245-254). Niagara Falls, Canada: Springer.
-
(2007)
ISPA Workshops, Lecture Notes in Computer Science
, vol.4743
, pp. 245-254
-
-
Yeo, S.S.1
Sakurai, K.2
Cho, S.3
Yang, K.4
Kim, S.K.5
|