-
1
-
-
33744939250
-
Adversary model for radio frequency identification
-
Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL, Security and Cryptography Laboratory LASEC, Lausanne, Switzerland, September
-
G. Avoine, Adversary model for radio frequency identification, Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland, September 2005
-
(2005)
-
-
Avoine, G.1
-
2
-
-
44649113207
-
Untraceability of RFID protocols
-
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks. Seville, Spain, Springer
-
van Deursen T., Mauw S., and Radomirović S. Untraceability of RFID protocols. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks. Seville, Spain. Lecture Notes in Computer Science vol. 5019 (2008), Springer 1-15
-
(2008)
Lecture Notes in Computer Science
, vol.5019
, pp. 1-15
-
-
van Deursen, T.1
Mauw, S.2
Radomirović, S.3
-
3
-
-
38149038702
-
On privacy models for RFID
-
Advances in Cryptology - ASIACRYPT 2007. Kuching, Malaysia, Springer-Verlag
-
Vaudenay S. On privacy models for RFID. Advances in Cryptology - ASIACRYPT 2007. Kuching, Malaysia. Lecture Notes in Computer Science vol. 4833 (2007), Springer-Verlag 68-87
-
(2007)
Lecture Notes in Computer Science
, vol.4833
, pp. 68-87
-
-
Vaudenay, S.1
-
4
-
-
34547687590
-
Defining strong privacy for RFID
-
IEEE Computer Society Press, New York, US
-
Juels A., and Weis S. Defining strong privacy for RFID. International Conference on Pervasive Computing and Communications - PerCom 2007, IEEE (2007), IEEE Computer Society Press, New York, US 342-347
-
(2007)
International Conference on Pervasive Computing and Communications - PerCom 2007, IEEE
, pp. 342-347
-
-
Juels, A.1
Weis, S.2
-
5
-
-
57049137188
-
-
J. Ha, S. Moon, J. Zhou, J. Ha, A new formal proof model for RFID location privacy, in: ESORICS, 2008, pp. 267-281
-
J. Ha, S. Moon, J. Zhou, J. Ha, A new formal proof model for RFID location privacy, in: ESORICS, 2008, pp. 267-281
-
-
-
-
7
-
-
0020720357
-
On the security of public key protocols
-
Dolev D., and Yao A. On the security of public key protocols. IEEE Trans. Inform. Theory IT-29 2 (1983) 198-208
-
(1983)
IEEE Trans. Inform. Theory
, vol.IT-29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
8
-
-
70350337337
-
How to hash into elliptic curves
-
CRYPTO 2009, Springer
-
Icart T. How to hash into elliptic curves. CRYPTO 2009. Lecture Notes in Computer Science (2009), Springer 303-316
-
(2009)
Lecture Notes in Computer Science
, pp. 303-316
-
-
Icart, T.1
-
9
-
-
49049105964
-
Provably secure RFID authentication protocol
-
EC-RAC ECDLP based randomized access control
-
Y.K. Lee, L. Batina, I. Verbauwhede, EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol, in: Proceedings of the 2008 IEEE International Conference on RFID, 2008, pp. 97-104
-
(2008)
Proceedings of the 2008 IEEE International Conference on RFID
, pp. 97-104
-
-
Lee, Y.K.1
Batina, L.2
Verbauwhede, I.3
-
10
-
-
70349268101
-
Untraceable RFID authentication protocols: Revision of EC-RAC
-
Orlando, Florida, USA
-
Y. Lee, L. Batina, I. Verbauwhede, Untraceable RFID authentication protocols: Revision of EC-RAC, in: IEEE International Conference on RFID, RFID 2009, Orlando, Florida, USA, 2009, pp. 178-185
-
(2009)
IEEE International Conference on RFID, RFID
, pp. 178-185
-
-
Lee, Y.1
Batina, L.2
Verbauwhede, I.3
-
13
-
-
58449108568
-
-
CANS
-
J. Bringer, H. Chabanne, T. Icart, Cryptanalysis of EC-RAC, a RFID identification protocol, in: CANS, 2008, pp. 149-161
-
(2008)
Cryptanalysis of EC-RAC, a RFID identification protocol
, pp. 149-161
-
-
Bringer, J.1
Chabanne, H.2
Icart, T.3
-
14
-
-
35048902569
-
-
B. Möller, A public-key encryption scheme with pseudo-random ciphertexts, in: ESORICS, 2004, pp. 335-351
-
B. Möller, A public-key encryption scheme with pseudo-random ciphertexts, in: ESORICS, 2004, pp. 335-351
-
-
-
|