-
1
-
-
70450256517
-
Albertsons Announces Mandate
-
Mar.
-
"Albertsons Announces Mandate," RFID J., http://www. rfidjournal.com/ article/articleview/819/1/1/, Mar. 2004.
-
(2004)
RFID J.
-
-
-
2
-
-
33744957484
-
Adversarial model for radio frequency identification
-
report 2005/049, IACR ePrint Archive Feb.
-
G. Avoine, Adversarial Model for Radio Frequency Identification, Cryptology ePrint Archive, report 2005/049, IACR ePrint Archive, http://eprint. iacr.org/2005/049, Feb. 2005.
-
Cryptology EPrint Archive
, pp. 2005
-
-
Avoine, G.1
-
3
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated Key Exchange Secure against Dictionary Attacks," Proc. Int'l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT '00), pp. 139-155, 2000.
-
(2000)
Proc. Int'l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT '00)
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
4
-
-
38049173955
-
E-Passport: The global traceability or how to feel like a ups package
-
D. Carluccio, K. Lemke, and C. Paar, "E-Passport: The Global Traceability or How to Feel Like a UPS Package," Proc. Seventh Int'l Workshop Information Security Applications (WISA '07), pp. 391-404, 2007.
-
(2007)
Proc. Seventh Int'l Workshop Information Security Applications (WISA '07)
, pp. 391-404
-
-
Carluccio, D.1
Lemke, K.2
Paar, C.3
-
5
-
-
70450281381
-
-
CASPIAN
-
CASPIAN, Boycott Benetton, http://www.boycottbenetton.com, 2007.
-
(2007)
-
-
-
6
-
-
36248982045
-
SASI: A new ultralightweight rfid authentication protocol providing strong authentication and strong integrity
-
Oct.-Dec.
-
H.-Y. Chien, "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity," IEEE Trans. Dependable and Secure Computing, vol.4, no.4, pp. 337-340, Oct.-Dec. 2007.
-
(2007)
IEEE Trans. Dependable and Secure Computing
, vol.4
, Issue.4
, pp. 337-340
-
-
Chien, H.-Y.1
-
7
-
-
77952285870
-
Security of ultra-lightweight rfid authentication protocols and its improvements
-
H.-Y. Chien and C.-W. Huang, "Security of Ultra-Lightweight RFID Authentication Protocols and Its Improvements," ACM Operating System Rev., vol.41, no.2, pp. 83-86, 2007.
-
(2007)
ACM Operating System Rev.
, vol.41
, Issue.2
, pp. 83-86
-
-
Chien, H.-Y.1
Huang, C.-W.2
-
8
-
-
38549131714
-
Vulnerabilities in first-generation rfid-enabled credit cards
-
T.S. Heydt-Benjamin, D.V. Bailey, K. Fu, A. Juels, and T. O'Hare, "Vulnerabilities in First-Generation RFID-Enabled Credit Cards," Proc. 11th Int'l Conf. Financial Cryptography and Data Security (FC '07), pp. 2-14, 2007.
-
(2007)
Proc. 11th Int'l Conf. Financial Cryptography and Data Security (FC '07)
, pp. 2-14
-
-
Heydt-Benjamin, T.S.1
Bailey, D.V.2
Fu, K.3
Juels, A.4
O'Hare, T.5
-
9
-
-
33845240394
-
Crossing borders: Security and privacy issues of the european e-Passport
-
J.-H. Hoepman, E. Hubbers, B. Jacobs, M. Oostdijk, and R.W. Schreur, "Crossing Borders: Security and Privacy Issues of the European e-Passport," Proc. First Int'l Workshop Security (IWSEC '06), pp. 152-167, 2006.
-
(2006)
Proc. First Int'l Workshop Security (IWSEC '06)
, pp. 152-167
-
-
Hoepman, J.-H.1
Hubbers, E.2
Jacobs, B.3
Oostdijk, M.4
Schreur, R.W.5
-
10
-
-
33847249519
-
Security and privacy issues in e-passports
-
last revised Sept.
-
A. Juels, D. Molnar, and D. Wagner, "Security and Privacy Issues in E-Passports," Proc. First IEEE Conf. Security and Privacy for Emerging Areas in Comm. Networks (SecureComm '05), http://eprint.iacr.org/2005/095, last revised Sept. 2007, pp. 74-88, 2005.
-
(2007)
Proc. First IEEE Conf. Security and Privacy for Emerging Areas in Comm. Networks (SecureComm '05)
, vol.2005
, pp. 74-88
-
-
Juels, A.1
Molnar, D.2
Wagner, D.3
-
12
-
-
36349031223
-
An analysis of security and privacy issues relating to rfid enabled epassports
-
E. Kosta, M. Meints, M. Hensen, and M. Gasson, "An Analysis of Security and Privacy Issues Relating to RFID Enabled ePassports," Proc. 22nd IFIP TC-11 Int'l Information Security Conf. (IFIP SEC '07), vol.232, pp. 467-472, 2007.
-
(2007)
Proc. 22nd IFIP TC-11 Int'l Information Security Conf. (IFIP SEC '07)
, vol.232
, pp. 467-472
-
-
Kosta, E.1
Meints, M.2
Hensen, M.3
Gasson, M.4
-
13
-
-
34748848124
-
Universally composable and forward-secure rfid authentication and authenticated key exchange
-
T.V. Le, M. Burmester, and B. de Medeiros, "Universally Composable and Forward-Secure RFID Authentication and Authenticated Key Exchange," Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS '07), http://eprint.iacr.org/2007/051, pp. 242-252, 2007.
-
(2007)
Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS '07)
, pp. 242-252
-
-
Le, T.V.1
Burmester, M.2
De Medeiros, B.3
-
16
-
-
70450286845
-
Security analysis on a family of ultra-lightweight rfid authentication protocols
-
T. Li, G. Wang, and R.H. Deng, "Security Analysis on a Family of Ultra-Lightweight RFID Authentication Protocols," J. Software, vol.3, no.3, pp. 1-10, 2008.
-
(2008)
J. Software
, vol.3
, Issue.3
, pp. 1-10
-
-
Li, T.1
Wang, G.2
Deng, R.H.3
-
17
-
-
70450228123
-
Michelin embeds rfid tags in tires
-
Jan.
-
"Michelin Embeds RFID Tags in Tires," RFID J., http://www.rfidjournal. com/article/articleview/269/1/1/, Jan. 2003.
-
(2003)
RFID J.
-
-
-
18
-
-
70450249226
-
Mitsubishi electric asia switches on RFID
-
Sept.
-
"Mitsubishi Electric Asia Switches on RFID," RFID J., http:// www.rfidjournal.com/article/articleview/2644/, Sept. 2006.
-
(2006)
RFID J.
-
-
-
19
-
-
41549168688
-
About machine- readable travel documents: Privacy enhancement using (Weakly) Non-transferable data authentication
-
J. Monnerat, S. Vaudenay, and M. Vuagnoux, "About Machine- Readable Travel Documents: Privacy Enhancement Using (Weakly) Non-Transferable Data Authentication," Proc. Third Workshop RFID Security (RFIDSec '07), pp. 15-28, 2007.
-
(2007)
Proc. Third Workshop RFID Security (RFIDSec '07)
, pp. 15-28
-
-
Monnerat, J.1
Vaudenay, S.2
Vuagnoux, M.3
-
20
-
-
0024983231
-
Public-Key cryptosystems provably secure against chosen ciphertext attacks
-
M. Naor and M. Yung, "Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attacks," Proc. ACM Symp. Theory of Computing (STOC '90), pp. 427-437, 1990.
-
(1990)
Proc. ACM Symp. Theory of Computing (STOC '90)
, pp. 427-437
-
-
Naor, M.1
Yung, M.2
-
24
-
-
36248971663
-
LMAP: A real lightweight mutual authentication protocol for low-cost RFID Tags
-
July
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "LMAP: A Real Lightweight Mutual Authentication Protocol for Low-Cost RFID Tags," Proc. Second Workshop RFID Security (RFIDSec '06), July 2006.
-
(2006)
Proc. Second Workshop RFID Security (RFIDSec '06)
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
25
-
-
33845455482
-
EMAP: An efficient mutual-authentication protocol for low-cost RFID tags
-
On the Move to Meaningful Internet Syst. 2006: OTM 2006 Workshops - OTM Confed. Int. Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerS
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "EMAP: A Efficient Mutual Authentication Protocol for Low-Cost RFID Tags," Proc. OTM Information Security Workshop (IS '06), pp. 352-361, 2006. (Pubitemid 44891824)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4277 LNCS - I
, pp. 352-361
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
26
-
-
33750067948
-
2AP: A minimalist mutual-authentication protocol for low-cost RFID tags
-
Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags," Proc. Third Int'l Conf. Ubiquitous Intelligence and Computing (UIC '06), pp. 912-923, 2006. (Pubitemid 44577871)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 912-923
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
27
-
-
38149118848
-
Security of a leakage- resilient protocol for key establishment and mutual authentication
-
R.C.-W. Phan, K.-K.R. Choo, and S.-H. Heng, "Security of a Leakage- Resilient Protocol for Key Establishment and Mutual Authentication," Proc. Int'l Conf. Provable Security (ProvSec '07), pp. 169-177, 2007.
-
(2007)
Proc. Int'l Conf. Provable Security (ProvSec '07)
, pp. 169-177
-
-
Phan, R.C.-W.1
Choo, K.-K.R.2
Heng, S.-H.3
-
30
-
-
0002360237
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
C. Rackoff and D. Simon, "Non-interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack," Proc. 11th Ann. Int'l Cryptology Conf. (CRYPTO '91), pp. 433-444, 1991.
-
(1991)
Proc. 11th Ann. Int'l Cryptology Conf. (CRYPTO '91)
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.2
-
31
-
-
70450226173
-
Target, wal-mart share EPC Data
-
Oct.
-
"Target, Wal-Mart Share EPC Data," RFID J., http://www.rfidjournal. com/article/articleview/642/1/1/, Oct. 2005.
-
(2005)
RFID J.
-
-
|