-
2
-
-
84994742813
-
-
Lowe, G.: A hierarchy of authentication specifications. In: CSFW, pp. 31-44 (1997)
-
Lowe, G.: A hierarchy of authentication specifications. In: CSFW, pp. 31-44 (1997)
-
-
-
-
3
-
-
44649113207
-
Untraceability of RFID Protocols
-
Onieva, J.A, Sauveron, D, Chaumette, S, Gollmann, D, Markantonakis, K, eds, WISTP 2008, Springer, Heidelberg
-
van Deursen, T., Mauw, S., Radomirović, S.: Untraceability of RFID Protocols. In: Onieva, J.A., Sauveron, D., Chaumette, S., Gollmann, D., Markantonakis, K. (eds.) WISTP 2008. LNCS, vol. 5019, pp. 1-15. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5019
, pp. 1-15
-
-
van Deursen, T.1
Mauw, S.2
Radomirović, S.3
-
4
-
-
33744939250
-
Adversary model for radio frequency identification
-
Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL, Security and Cryptography Laboratory (LASEC, Lausanne, Switzerland September
-
Avoine, G.: Adversary model for radio frequency identification. Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland (September 2005)
-
(2005)
-
-
Avoine, G.1
-
5
-
-
34547687590
-
Defining strong privacy for RFID
-
New York, USA, pp, IEEE Computer Society Press, Los Alamitos
-
Juels, A., Weis, S.: Defining strong privacy for RFID. In: IEEE International Conference on Pervasive Computing and Communications - PerCom 2007, New York, USA, pp. 342-347. IEEE Computer Society Press, Los Alamitos (2007)
-
(2007)
IEEE International Conference on Pervasive Computing and Communications - PerCom
, pp. 342-347
-
-
Juels, A.1
Weis, S.2
-
6
-
-
38149038702
-
On privacy models for RFID
-
Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
-
Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68-87. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 68-87
-
-
Vaudenay, S.1
-
7
-
-
43149103199
-
-
Damgård, I., Pedersen, M.Ø.: RFID security: Tradeoffs between security and efficiency. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, 4964, pp. 318-332. Springer, Heidelberg (2008)
-
Damgård, I., Pedersen, M.Ø.: RFID security: Tradeoffs between security and efficiency. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 318-332. Springer, Heidelberg (2008)
-
-
-
-
8
-
-
70349118926
-
Mutual authentication in RFID: Security and privacy
-
ACM Press, New York
-
Paise, R.I., Vaudenay, S.: Mutual authentication in RFID: Security and privacy. In: ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008), pp. 292-299. ACM Press, New York (2008)
-
(2008)
ACM Symposium on Information, Computer and Communications Security (ASIACCS
, pp. 292-299
-
-
Paise, R.I.1
Vaudenay, S.2
-
9
-
-
33751546328
-
Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards
-
Elsevier Science Publishers
-
Chien, H.Y., Chen, C.H.: Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computer Standars & Interfaces, Elsevier Science Publishers 29(2), 254-259 (2007)
-
(2007)
Computer Standars & Interfaces
, vol.29
, Issue.2
, pp. 254-259
-
-
Chien, H.Y.1
Chen, C.H.2
-
10
-
-
44649129274
-
-
standard
-
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J., Ribagorda, A.: Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard (2007)
-
(2007)
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.3
Ribagorda, A.4
-
11
-
-
49049105964
-
EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol
-
Lee, Y.K., Batina, L., Verbauwhede, I.: EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol. In: Proceedings of the 2008 IEEE International Conference on RFID, pp. 97-104 (2008)
-
(2008)
Proceedings of the 2008 IEEE International Conference on RFID
, pp. 97-104
-
-
Lee, Y.K.1
Batina, L.2
Verbauwhede, I.3
-
12
-
-
58449108568
-
-
Bringer, J., Chabanne, H., Icart, T.: Cryptanalysis of EC-RAC, a RFID identification protocol. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, 5339, pp. 149-161. Springer, Heidelberg (2008)
-
Bringer, J., Chabanne, H., Icart, T.: Cryptanalysis of EC-RAC, a RFID identification protocol. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 149-161. Springer, Heidelberg (2008)
-
-
-
-
13
-
-
38149091047
-
-
Chien, H.Y., Huang, C.W.: A lightweight RFID protocol using substring. In: Kuo, T.-W., Sha, E., Guo, M., Yang, L.T., Shao, Z. (eds.) EUC 2007. LNCS, 4808, pp. 422-431. Springer, Heidelberg (2007)
-
Chien, H.Y., Huang, C.W.: A lightweight RFID protocol using substring. In: Kuo, T.-W., Sha, E., Guo, M., Yang, L.T., Shao, Z. (eds.) EUC 2007. LNCS, vol. 4808, pp. 422-431. Springer, Heidelberg (2007)
-
-
-
-
14
-
-
33845415153
-
-
Kim, K.H., Choi, E.Y., Lee, S.M., Lee, D.H.: Secure EPCglobal class-1 gen-2 RFID system against security and privacy problems. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, 4277, pp. 362-371. Springer, Heidelberg (2006)
-
Kim, K.H., Choi, E.Y., Lee, S.M., Lee, D.H.: Secure EPCglobal class-1 gen-2 RFID system against security and privacy problems. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 362-371. Springer, Heidelberg (2006)
-
-
-
-
15
-
-
34247218520
-
RFID mutual authentication scheme based on synchronized secret information
-
Hiroshima, Japan January
-
Lee, S., Asano, T., Kim, K.: RFID mutual authentication scheme based on synchronized secret information. In: Symposium on Cryptography and Information Security, Hiroshima, Japan (January 2006)
-
(2006)
Symposium on Cryptography and Information Security
-
-
Lee, S.1
Asano, T.2
Kim, K.3
-
17
-
-
84869649421
-
-
van Deursen, T, Radomirović, S, Attacks on RFID protocols (version 1.0, Cryptology ePrint Archive, Report 2008/310 July 2008
-
van Deursen, T., Radomirović, S.: Attacks on RFID protocols (version 1.0). Cryptology ePrint Archive, Report 2008/310 (July 2008), http://eprint.iacr.org/2008/310
-
-
-
-
18
-
-
24944514681
-
Operational Semantics of Security Protocols
-
Leue, S, Systä, T.J, eds, Scenarios: Models, Transformations and Tools, Springer, Heidelberg
-
Cremers, C., Mauw, S.: Operational Semantics of Security Protocols. In: Leue, S., Systä, T.J. (eds.) Scenarios: Models, Transformations and Tools. LNCS, vol. 3466, pp. 66-89. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3466
, pp. 66-89
-
-
Cremers, C.1
Mauw, S.2
-
19
-
-
0031640904
-
Strand spaces: Why is a security protocol correct?
-
Oakland, California, pp
-
Thayer Fàbrega, F., Herzog, J., Guttman, J.: Strand spaces: Why is a security protocol correct? In: Proc. 1998 IEEE Symposium on Security and Privacy, Oakland, California, pp. 66-77 (1998)
-
(1998)
Proc. 1998 IEEE Symposium on Security and Privacy
, pp. 66-77
-
-
Thayer Fàbrega, F.1
Herzog, J.2
Guttman, J.3
-
20
-
-
70350607144
-
-
Kim, I.J., Choi, E.Y., Lee, D.H.: Secure mobile RFID system against privacy and security problems. In: SecPerU 2007 (2007)
-
Kim, I.J., Choi, E.Y., Lee, D.H.: Secure mobile RFID system against privacy and security problems. In: SecPerU 2007 (2007)
-
-
-
-
21
-
-
34748921704
-
-
Li, Y., Ding, X.: Protecting RFID communications in supply chains. In: ASIACCS, pp. 234-241 (2007)
-
Li, Y., Ding, X.: Protecting RFID communications in supply chains. In: ASIACCS, pp. 234-241 (2007)
-
-
-
-
22
-
-
38349066494
-
-
Osaka, K., Takagi, T., Yamazaki, K., Takahashi, O.: An efficient and secure RFID security method with ownership transfer. In: Wang, Y., Cheung, Y.-m., Liu, H. (eds.) CIS 2006. LNCS, 4456, pp. 778-787. Springer, Heidelberg (2007)
-
Osaka, K., Takagi, T., Yamazaki, K., Takahashi, O.: An efficient and secure RFID security method with ownership transfer. In: Wang, Y., Cheung, Y.-m., Liu, H. (eds.) CIS 2006. LNCS, vol. 4456, pp. 778-787. Springer, Heidelberg (2007)
-
-
-
-
23
-
-
70350592734
-
-
Yang, J., Park, J., Lee, H., Ren, K., Kim, K.: Mutual authentication protocol for low-cost RFID. In: Handout of the Ecrypt Workshop on RFID and Lightweight Crypto (July 2005)
-
Yang, J., Park, J., Lee, H., Ren, K., Kim, K.: Mutual authentication protocol for low-cost RFID. In: Handout of the Ecrypt Workshop on RFID and Lightweight Crypto (July 2005)
-
-
-
-
24
-
-
33745181952
-
Authenticating Pervasive Devices with Human Protocols
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Juels, A., Weis, S.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293-308. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 293-308
-
-
Juels, A.1
Weis, S.2
-
26
-
-
38049010942
-
Information confinement, privacy, and security in RFID systems
-
Biskup, J, López, J, eds, ESORICS 2007, Springer, Heidelberg
-
Di Pietro, R., Molva, R.: Information confinement, privacy, and security in RFID systems. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 187-202. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4734
, pp. 187-202
-
-
Di Pietro, R.1
Molva, R.2
-
27
-
-
33750067948
-
-
2AP: A minimalist mutual-authentication protocol for low-cost RFID tags. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, 4159, pp. 912-923. Springer, Heidelberg (2006)
-
2AP: A minimalist mutual-authentication protocol for low-cost RFID tags. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol. 4159, pp. 912-923. Springer, Heidelberg (2006)
-
-
-
-
28
-
-
33845455482
-
-
Peris-Lopez, P., Castro, J.C.H., Estévez-Tapiador, J.M., Ribagorda, A.: EMAP: An efficient mutual-authentication protocol for low-cost RFID tags. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, 4277, pp. 352-361. Springer, Heidelberg (2006)
-
Peris-Lopez, P., Castro, J.C.H., Estévez-Tapiador, J.M., Ribagorda, A.: EMAP: An efficient mutual-authentication protocol for low-cost RFID tags. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 352-361. Springer, Heidelberg (2006)
-
-
-
-
29
-
-
36248971663
-
LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags
-
July
-
Peris-Lopez, P., Castro, J.C.H., Estévez-Tapiador, J.M., Ribagorda, A.: LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. In: Printed handout of Workshop on RFID Security - RFIDSec 2006 (July 2006)
-
(2006)
Printed handout of Workshop on RFID Security - RFIDSec
-
-
Peris-Lopez, P.1
Castro, J.C.H.2
Estévez-Tapiador, J.M.3
Ribagorda, A.4
-
30
-
-
38149037913
-
Passive attacks on a class of authentication protocols for RFID
-
Nam, K.-H, Rhee, G, eds, ICISC 2007, Springer, Heidelberg
-
Alomair, B., Lazos, L., Poovendran, R.: Passive attacks on a class of authentication protocols for RFID. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 102-115. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4817
, pp. 102-115
-
-
Alomair, B.1
Lazos, L.2
Poovendran, R.3
-
31
-
-
36248977046
-
-
IFIP SEC, Sandton, Gauteng, South Africa, IFIP May
-
Li, T., Wang, G.: Security analysis of two ultra-lightweight RFID authentication protocols. In: IFIP SEC 2007, Sandton, Gauteng, South Africa, IFIP (May 2007)
-
(2007)
Security analysis of two ultra-lightweight RFID authentication protocols
-
-
Li, T.1
Wang, G.2
-
32
-
-
33644534001
-
Lightweight authentication protocols for low-cost RFID tags
-
Seattle, WA, USA October
-
Vajda, I., Buttyán, L.: Lightweight authentication protocols for low-cost RFID tags. In: Second Workshop on Security in Ubiquitous Computing - Ubicomp 2003, Seattle, WA, USA (October 2003)
-
(2003)
Second Workshop on Security in Ubiquitous Computing - Ubicomp
-
-
Vajda, I.1
Buttyán, L.2
-
33
-
-
33745757995
-
-
Kang, J., Nyang, D.: RFID authentication protocol with strong resistance against traceability and denial of service attacks. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, 3813, pp. 164-175. Springer, Heidelberg (2005)
-
Kang, J., Nyang, D.: RFID authentication protocol with strong resistance against traceability and denial of service attacks. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 164-175. Springer, Heidelberg (2005)
-
-
-
|