-
1
-
-
35348826790
-
Physical Access Control for Captured RFID Data
-
T. Kriplean, E. Welbourne, N. Khoussainova, V. Rastogi, M. Balazinska, G. Borriello, T. Kohno, and D. Suciu, "Physical Access Control for Captured RFID Data," IEEE Pervasive Computing, vol. 6, 2007.
-
(2007)
IEEE Pervasive Computing
, vol.6
-
-
Kriplean, T.1
Welbourne, E.2
Khoussainova, N.3
Rastogi, V.4
Balazinska, M.5
Borriello, G.6
Kohno, T.7
Suciu, D.8
-
3
-
-
34748921704
-
Protecting RFID Communications in Supply Chains
-
Y. Li and X. Ding, "Protecting RFID Communications in Supply Chains," in Proceedings of ASIACCS, 2007.
-
(2007)
Proceedings of ASIACCS
-
-
Li, Y.1
Ding, X.2
-
4
-
-
34547617684
-
Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments
-
P. Robinson and M. Beigl, "Trust Context Spaces: an Infrastructure for Pervasive Security in Context-Aware Environments," in Proceedings of SPC, 2003.
-
(2003)
Proceedings of SPC
-
-
Robinson, P.1
Beigl, M.2
-
5
-
-
21144438831
-
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
-
S. Weis, S. Sarma, R. Rivest, and D. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," in Proceedings of SPC, 2003.
-
(2003)
Proceedings of SPC
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
6
-
-
70349700627
-
A Secure and Efficient RFID Protocol that Could make Big Brother (partially) Obsolete
-
T. Dimitriou, "A Secure and Efficient RFID Protocol that Could make Big Brother (partially) Obsolete," in Proceedings of PerCom, 2006.
-
(2006)
Proceedings of PerCom
-
-
Dimitriou, T.1
-
7
-
-
14844294769
-
Privacy and Security in Library RFID: Issues, Practices, and Architectures
-
D. Molnar and D. Wagner, "Privacy and Security in Library RFID: Issues, Practices, and Architectures," in Proceedings of CCS, 2004.
-
(2004)
Proceedings of CCS
-
-
Molnar, D.1
Wagner, D.2
-
8
-
-
34548180384
-
A Scalable, Delegatable Pseudonym Protocol Enabling Owner-ship Transfer of RFID Tags
-
D. Molnar, A. Soppera, and D. Wagner, "A Scalable, Delegatable Pseudonym Protocol Enabling Owner-ship Transfer of RFID Tags," in Proceedings of SAC, 2005.
-
(2005)
Proceedings of SAC
-
-
Molnar, D.1
Soppera, A.2
Wagner, D.3
-
9
-
-
34547617482
-
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
-
L. Lu, J. Han, L. Hu, Y. Liu, and L. M. Ni, "Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems," in Proceedings of PerCom, 2007.
-
(2007)
Proceedings of PerCom
-
-
Lu, L.1
Han, J.2
Hu, L.3
Liu, Y.4
Ni, L.M.5
-
13
-
-
34547639877
-
Efficient Hash-Chain based RFID Privacy Protection Scheme
-
M. Ohkubo, K. Suzuki, and S. Kinoshita, "Efficient Hash-Chain based RFID Privacy Protection Scheme," in Proceedings of UbiComp, Workshop Privacy, 2004.
-
(2004)
Proceedings of UbiComp, Workshop Privacy
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
14
-
-
20844453821
-
Minimalist Cryptography for Low-Cost RFID Tags
-
A. Juels, "Minimalist Cryptography for Low-Cost RFID Tags," in Proceedings of SCN, 2004.
-
(2004)
Proceedings of SCN
-
-
Juels, A.1
-
15
-
-
34547626956
-
A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks
-
T. Dimitriou, "A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks," in Proceedings of SecureComm, 2005.
-
(2005)
Proceedings of SecureComm
-
-
Dimitriou, T.1
-
16
-
-
33750290259
-
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
-
G. Tsudik, "YA-TRAP: Yet Another Trivial RFID Authentication Protocol," in Proceedings of PerCom Workshops, 2006.
-
(2006)
Proceedings of PerCom Workshops
-
-
Tsudik, G.1
-
19
-
-
70349712952
-
-
G. Avoine, Adversarial Model for Radio Frequency Identification, Technical Report 2005/049. http://eprint.iacr.org/2005/ 049, 2005.
-
G. Avoine, "Adversarial Model for Radio Frequency Identification," Technical Report 2005/049. http://eprint.iacr.org/2005/ 049, 2005.
-
-
-
-
20
-
-
51349086896
-
Towards Statistically Strong Source Anonymity for Sensor Networks
-
M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards Statistically Strong Source Anonymity for Sensor Networks," in Proceedings of Infocom, 2008.
-
(2008)
Proceedings of Infocom
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
21
-
-
51849160751
-
On Security Vulnerabilities of Null Data Frames in IEEE 802.11 based WLANs
-
W. Gu, Z. Yang, C. Que, D. Xuan and W. Jia, "On Security Vulnerabilities of Null Data Frames in IEEE 802.11 based WLANs," in Proceedings of ICDCS, 2008.
-
(2008)
Proceedings of ICDCS
-
-
Gu, W.1
Yang, Z.2
Que, C.3
Xuan, D.4
Jia, W.5
-
22
-
-
41449110757
-
A New Fault-Information Model for Adaptive & Minimal Routing in 3-D Meshes
-
Z. Jiang, J. Wu, and D. Wang, "A New Fault-Information Model for Adaptive & Minimal Routing in 3-D Meshes," IEEE Transactions on Reliability, vol. 57, 2008.
-
(2008)
IEEE Transactions on Reliability
, vol.57
-
-
Jiang, Z.1
Wu, J.2
Wang, D.3
-
23
-
-
0027726717
-
Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
-
M. Bellare and P. Rogaway, "Random Oracles are Practical: A Paradigm for Designing Efficient Protocols," in Proceedings of CCS, 1993.
-
(1993)
Proceedings of CCS
-
-
Bellare, M.1
Rogaway, P.2
|