-
1
-
-
70350424348
-
-
Avoine, G.: Privacy Issues in RFID Banknote Protection Schemes. In: CARDIS, pp. 34-38. Kluwer Academic Publishers, Dordrecht (2004)
-
Avoine, G.: Privacy Issues in RFID Banknote Protection Schemes. In: CARDIS, pp. 34-38. Kluwer Academic Publishers, Dordrecht (2004)
-
-
-
-
3
-
-
26444443915
-
A Scalable and Provably Secure Hash-Based RFID Protocol. In: PerSec
-
Los Alamitos
-
Avoine, G., Oechslin, P.: A Scalable and Provably Secure Hash-Based RFID Protocol. In: PerSec, pp. 110-114. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
IEEE Computer Society Press
, pp. 110-114
-
-
Avoine, G.1
Oechslin, P.2
-
4
-
-
26444478592
-
-
Avoine,G.,Oechslin,P.:RFIDTraceability: AMultilayer Problem. In: S.Patrick,A., Yung,M. (eds.) FC 2005. LNCS, 3570, pp. 125-140. Springer, Heidelberg (2005)
-
Avoine,G.,Oechslin,P.:RFIDTraceability: AMultilayer Problem. In: S.Patrick,A., Yung,M. (eds.) FC 2005. LNCS, vol. 3570, pp. 125-140. Springer, Heidelberg (2005)
-
-
-
-
5
-
-
38149091047
-
-
Chien, H.-Y., Huang, C.-W.: A Lightweight RFID Protocol Using Substring. In: EUC, pp. 422-431 (2007)
-
Chien, H.-Y., Huang, C.-W.: A Lightweight RFID Protocol Using Substring. In: EUC, pp. 422-431 (2007)
-
-
-
-
6
-
-
33847330246
-
A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks
-
Dimitriou, T.: A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks. In: SecureComm (2005)
-
(2005)
SecureComm
-
-
Dimitriou, T.1
-
7
-
-
35048899238
-
-
Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal Re-Encryption for Mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, 2964, pp. 163-178. Springer, Heidelberg (2004)
-
Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal Re-Encryption for Mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163-178. Springer, Heidelberg (2004)
-
-
-
-
8
-
-
38149047468
-
Low-cost and Strong-security RFID Authentication Protocol
-
Ha, J., Moon, S.-J., Nieto, J.M.G., Boyd, C.: Low-cost and Strong-security RFID Authentication Protocol. In: EUC Workshops, pp. 795-807 (2007)
-
(2007)
EUC Workshops
, pp. 795-807
-
-
Ha, J.1
Moon, S.-J.2
Nieto, J.M.G.3
Boyd, C.4
-
9
-
-
2942625823
-
Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. In: PerSec
-
Los Alamitos
-
Henrici, D., Muller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. In: PerSec, pp. 149-153. IEEE Computer Society Press, Los Alamitos (2004)
-
(2004)
IEEE Computer Society Press
, pp. 149-153
-
-
Henrici, D.1
Muller, P.2
-
12
-
-
33745757995
-
-
Kang, J., Nyang, D.: RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, 3813, pp. 164-175. Springer, Heidelberg (2005)
-
Kang, J., Nyang, D.: RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 164-175. Springer, Heidelberg (2005)
-
-
-
-
13
-
-
70350414388
-
-
Kim, I.J., Choi, E.Y., Lee, D.H.: Secure Mobile RFID System Against Privacy and Security Problems. In: SecPerU (2007)
-
Kim, I.J., Choi, E.Y., Lee, D.H.: Secure Mobile RFID System Against Privacy and Security Problems. In: SecPerU (2007)
-
-
-
-
14
-
-
33845415153
-
-
Kim, K.H., Choi, E.Y., Lee, S.-M., Lee, D.H.: Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, 4277, pp. 362-371. Springer, Heidelberg (2006)
-
Kim, K.H., Choi, E.Y., Lee, S.-M., Lee, D.H.: Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 362-371. Springer, Heidelberg (2006)
-
-
-
-
17
-
-
24944582157
-
Efficient authentication for lowcost RFID systems
-
Gervasi, O, Gavrilova, M.L, Kumar, V, Laganá, A, Lee, H.P, Mun, Y, Taniar, D, Tan, C.J.K, eds, ICCSA 2005, Springer, Heidelberg
-
Lee, S.M., Hwang, Y.J., Lee, D.-H., Lim, J.-I.: Efficient authentication for lowcost RFID systems. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3480, pp. 619-627. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3480
, pp. 619-627
-
-
Lee, S.M.1
Hwang, Y.J.2
Lee, D.-H.3
Lim, J.-I.4
-
18
-
-
34748921704
-
-
Li, Y., Ding, X.: Protecting RFID Communications in Supply Chains. In: ASIACCS, pp. 234-241. ACM Press, New York (2007)
-
Li, Y., Ding, X.: Protecting RFID Communications in Supply Chains. In: ASIACCS, pp. 234-241. ACM Press, New York (2007)
-
-
-
-
19
-
-
38149000154
-
An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System
-
Lo, N.W., Yeh, K.-H.: An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System. In: TRUST - EUC Workshops, pp. 43-56 (2007)
-
(2007)
TRUST - EUC Workshops
, pp. 43-56
-
-
Lo, N.W.1
Yeh, K.-H.2
-
20
-
-
70350424346
-
-
Lo, N.W., Yeh, K.-H.: Hash-based Mutual Authentication Protocol for Mobile RFID Systems with Robust Reader-side Privacy Protection. In: SenseID - ACM SenSys Workshops (2007)
-
Lo, N.W., Yeh, K.-H.: Hash-based Mutual Authentication Protocol for Mobile RFID Systems with Robust Reader-side Privacy Protection. In: SenseID - ACM SenSys Workshops (2007)
-
-
-
-
21
-
-
38049077489
-
Novel RFID Authentication Schemes for Security Enhancement and System Efficiency
-
Lo, N.W., Yeh, K.-H.: Novel RFID Authentication Schemes for Security Enhancement and System Efficiency. In: VLDB - Secure Data Management Workshops, pp. 203-212 (2007)
-
(2007)
VLDB - Secure Data Management Workshops
, pp. 203-212
-
-
Lo, N.W.1
Yeh, K.-H.2
-
22
-
-
14844294769
-
Privacy and Security in Library RFID: Issues, Practices, and Architectures
-
Molnar, D., Wagner, D.: Privacy and Security in Library RFID: Issues, Practices, and Architectures. In: ACM CCS, pp. 210-219 (2004)
-
(2004)
ACM CCS
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
23
-
-
57049184162
-
RFID Privacy Models Revisited
-
Jajodia, S, Lopez, J, eds, ESORICS 2008, Springer, Heidelberg
-
Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: RFID Privacy Models Revisited. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 251-266. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 251-266
-
-
Ng, C.Y.1
Susilo, W.2
Mu, Y.3
Safavi-Naini, R.4
-
25
-
-
33749994390
-
Efficient hash-chain based RFID privacy protection scheme
-
Ohkubo, M., Suzuki, K., Kinoshita, S.: Efficient hash-chain based RFID privacy protection scheme. In: UbiComp Workshop, Ubicomp Privacy: Current Status and Future Directions (2004)
-
(2004)
UbiComp Workshop, Ubicomp Privacy: Current Status and Future Directions
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
26
-
-
70350414387
-
-
Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID. In: SCIS (2004)
-
Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID. In: SCIS (2004)
-
-
-
-
27
-
-
25444432606
-
RFID Privacy Issues and Technical Challenges
-
Ohkubo, M., Suzuki, K., Kinoshita, S.: RFID Privacy Issues and Technical Challenges. Communications of the ACM 48(9), 66-71 (2005)
-
(2005)
Communications of the ACM
, vol.48
, Issue.9
, pp. 66-71
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
28
-
-
38349066494
-
-
Osaka, K., Takagi, T., Yamazaki, K., Takahashi, O.: An efficient and secure RFID security method with ownership transfer. In: Wang, Y., Cheung, Y.-m., Liu, H. (eds.) CIS 2006. LNCS (LNAI), 4456, pp. 778-787. Springer, Heidelberg (2007)
-
Osaka, K., Takagi, T., Yamazaki, K., Takahashi, O.: An efficient and secure RFID security method with ownership transfer. In: Wang, Y., Cheung, Y.-m., Liu, H. (eds.) CIS 2006. LNCS (LNAI), vol. 4456, pp. 778-787. Springer, Heidelberg (2007)
-
-
-
-
29
-
-
70349118926
-
-
Paise, R.-l., Vaudenay, S.: Mutual Authentication in RFID. In: ASIACCS, pp. 292-299. ACM Press, New York (2008)
-
Paise, R.-l., Vaudenay, S.: Mutual Authentication in RFID. In: ASIACCS, pp. 292-299. ACM Press, New York (2008)
-
-
-
-
30
-
-
33750291916
-
-
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: RFID Systems: A Survey on Security Threats and Proposed Solutions. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, 4217, pp. 159-170. Springer, Heidelberg (2006)
-
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: RFID Systems: A Survey on Security Threats and Proposed Solutions. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 159-170. Springer, Heidelberg (2006)
-
-
-
-
31
-
-
38049010942
-
Information Confinement, Privacy, and Security in RFID Systems
-
Biskup, J, López, J, eds, ESORICS 2007, Springer, Heidelberg
-
Di Pietro, R., Molva, R.: Information Confinement, Privacy, and Security in RFID Systems. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 187-202. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4734
, pp. 187-202
-
-
Di Pietro, R.1
Molva, R.2
-
32
-
-
33749406338
-
A Scalable and Untraceable Authentication Protocol for RFID
-
Seo, Y., Lee, H., Kim, K.: A Scalable and Untraceable Authentication Protocol for RFID. In: EUC Workshops, pp. 252-261 (2006)
-
(2006)
EUC Workshops
, pp. 252-261
-
-
Seo, Y.1
Lee, H.2
Kim, K.3
-
33
-
-
38149050502
-
-
Tsudik, G.: A Family of Dunces: Trivial RFID Identification and Authentication Protocols. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, 4776, pp. 45-61. Springer, Heidelberg (2007)
-
Tsudik, G.: A Family of Dunces: Trivial RFID Identification and Authentication Protocols. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 45-61. Springer, Heidelberg (2007)
-
-
-
-
35
-
-
38149038702
-
On Privacy Models for RFID
-
Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
-
Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68-87. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 68-87
-
-
Vaudenay, S.1
-
36
-
-
35048876270
-
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
-
Hutter, D, Müller, G, Stephan, W, Ullmann, M, eds, Security in Pervasive Computing, Springer, Heidelberg
-
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201-212. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
37
-
-
33751520626
-
Mutual Authentication Protocol for Low-cost RFID
-
Yang, J., Park, J., Lee, H., Ren, K., Kim, K.: Mutual Authentication Protocol for Low-cost RFID. In: Handout of the Ecrypt Workshop on RFID and Lightweight Crypto (2005)
-
(2005)
Handout of the Ecrypt Workshop on RFID and Lightweight Crypto
-
-
Yang, J.1
Park, J.2
Lee, H.3
Ren, K.4
Kim, K.5
|