-
4
-
-
33947515842
-
Reducing time complexity in RFID systems
-
Springer- Verlag, Berlin
-
AVOINE, G., DYSLI, E., AND OECHSLIN, P. 2005. Reducing time complexity in RFID systems. In Proceedings of the 12th Annual Workshop on Selected Areas in Cryptography (SAC'05). Springer- Verlag, Berlin.
-
(2005)
Proceedings of the 12th Annual Workshop on Selected Areas in Cryptography (SAC'05)
-
-
Avoine, G.1
Dysli, E.2
Oechslin, P.3
-
6
-
-
26444443915
-
A scalable and provably secure hash based RFID protocol
-
IEEE, Los Alamitos, CA
-
AVOINE, G. AND OECHSLIN, P. 2005b. A scalable and provably secure hash based RFID protocol. In Proceedings of the 2nd IEEE International Workshop on Pervasive Computing and Communication Security (PerSec'05). IEEE, Los Alamitos, CA, 110-114.
-
(2005)
Proceedings of the 2nd IEEE International Workshop on Pervasive Computing and Communication Security (PerSec'05)
, pp. 110-114
-
-
Avoine, G.1
Oechslin, P.2
-
8
-
-
28144462281
-
Universally composable security: A new paradigm for cryptographic protocols
-
CANETTI, R. Universally composable security: A new paradigm for cryptographic protocols. IACR ePrint Report 2000/067. http://eprint.iacr.org/ 2000/067
-
IACR EPrint Report 2000/067
-
-
Canetti, R.1
-
9
-
-
33750402779
-
Zero-knowledge device authentication: Privacy and security enhanced RFID preserving business value and consumer convenience
-
IEEE, Los Alamitos, CA
-
ENGBERG, S., HARNING, M., AND JENSEN, C. 2004. Zero-knowledge device authentication: Privacy and security enhanced RFID preserving business value and consumer convenience. In Proceedings of the 2nd Annual Conference on Privacy, Security, and Trust. IEEE, Los Alamitos, CA.
-
(2004)
Proceedings of the 2nd Annual Conference on Privacy, Security, and Trust
-
-
Engberg, S.1
Harning, M.2
Jensen, C.3
-
10
-
-
33746098384
-
Some methods for privacy in RFID communication
-
Springer, Berlin
-
FISHKIN, K. P., ROY, S., AND JIANG, B. 2004. Some methods for privacy in RFID communication. In Proceedings of the 1st EuropeanWorkshop on Security in Ad-Hoc and Sensor Networks (ESAS'04). Springer, Berlin.
-
(2004)
Proceedings of the 1st EuropeanWorkshop on Security in Ad-Hoc and Sensor Networks (ESAS'04)
-
-
Fishkin, K.P.1
Roy, S.2
Jiang, B.3
-
11
-
-
35048899238
-
Universal re-encryption for mixnets
-
Springer, Berlin
-
GOLLE, P., JAKOBSSON, M., JUELS, A., AND SYVERSON, P. 2004. Universal re-encryption for mixnets. In Proceedings of the Cryptographers' Track RSA Conference (CT-RSA). Springer, Berlin, 163-178.
-
(2004)
Proceedings of the Cryptographers' Track RSA Conference (CT-RSA)
, pp. 163-178
-
-
Golle, P.1
Jakobsson, M.2
Juels, A.3
Syverson, P.4
-
12
-
-
0019038335
-
A cryptanalytic time-memory tradeoff
-
HELLMAN, M. 1980. A cryptanalytic time-memory tradeoff. IEEE Trans. Inf. Theor. 26, 401-406.
-
(1980)
IEEE Trans. Inf. Theor.
, vol.26
, pp. 401-406
-
-
Hellman, M.1
-
14
-
-
33144457479
-
RFID security and privacy: A research survey
-
JUELS, A. 2006. RFID security and privacy: A research survey. IEEE J. Sel. Areas Comm. 24, 2.
-
(2006)
IEEE J. Sel. Areas Comm.
, vol.24
, pp. 2
-
-
Juels, A.1
-
15
-
-
18744409344
-
The blocker tag: Selective blocking of RFID tags for consumer privacy
-
ACM, New York
-
JUELS, A., RIVEST, R., AND SZYDLO, M. 2003. The blocker tag: Selective blocking of RFID tags for consumer privacy. In Proceedings of the 8th ACM Conference on Computer and Communications Security. ACM, New York, 103-111.
-
(2003)
Proceedings of the 8th ACM Conference on Computer and Communications Security
, pp. 103-111
-
-
Juels, A.1
Rivest, R.2
Szydlo, M.3
-
16
-
-
84888496710
-
Can zero-knowledge tags protect privacy?
-
KAHN, F. 2005. Can zero-knowledge tags protect privacy? RFID J. http://www.rfidjournal. com/article/articleview/1891/1/1/.
-
(2005)
RFID J
-
-
Kahn, F.1
-
17
-
-
33749410503
-
Privacy enhanced active RFID tag
-
Springer-Verlag, Berlin
-
KINOSHITA, A., OHKUBO, M., HOSHINO, F., MOROHASHI, G., SHIONOIRI, O., AND KANAI, A. 2005. Privacy enhanced active RFID tag. In Proceedings of the International Workshop on Exploiting Context Histories in Smart Environments. Springer-Verlag, Berlin.
-
(2005)
Proceedings of the International Workshop on Exploiting Context Histories in Smart Environments
-
-
Kinoshita, A.1
Ohkubo, M.2
Hoshino, F.3
Morohashi, G.4
Shionoiri, O.5
Kanai, A.6
-
18
-
-
33745597876
-
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
-
Springer-Verlag, Berlin
-
MOLNAR, D., SOPPERA, A., AND WAGNER, D. 2005. A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In Proceedings of the 12th Annual Workshop on Selected Areas in Cryptography (SAC'05). Springer-Verlag, Berlin.
-
(2005)
Proceedings of the 12th Annual Workshop on Selected Areas in Cryptography (SAC'05)
-
-
Molnar, D.1
Soppera, A.2
Wagner, D.3
-
19
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
ACM, New York
-
MOLNAR, D. AND WAGNER, D. 2004. Privacy and security in library RFID: Issues, practices, and architectures. In Proceedings of the ACMConference on Communications and Computer Security. ACM, New York, 210-219.
-
(2004)
Proceedings of the ACMConference on Communications and Computer Security
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
20
-
-
33749005411
-
Quantitative evaluation of unlinkable ID matching schemes
-
ACM, New York
-
NOHARA, Y., INOUE, S., BABA, K., AND YASUURA, H. 2005. Quantitative evaluation of unlinkable ID matching schemes. In Proceedings of theWorkshop on Privacy in the Electronic Society (WPES'05). ACM, New York.
-
(2005)
Proceedings of TheWorkshop on Privacy in the Electronic Society (WPES'05)
-
-
Nohara, Y.1
Inoue, S.2
Baba, K.3
Yasuura, H.4
-
21
-
-
79957924511
-
EPC tags subject to phone attacks
-
O'CONNOR, M. 2006. EPC tags subject to phone attacks. RFID J. http://www1.rfidjournal. com/article/articleview/2167/1/1.
-
(2006)
RFID J
-
-
O'Connor, M.1
-
23
-
-
79954414365
-
Efficient hash-chain-based RFID privacy protection scheme
-
Springer- Verlag, Berlin
-
OHKUBO, M., SUZUKI, K., AND KINOSHITA, S. 2004. Efficient hash-chain-based RFID privacy protection scheme. In Proceedings of the International Conference on Ubiquitous Computing. Springer- Verlag, Berlin.
-
(2004)
Proceedings of the International Conference on Ubiquitous Computing
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
26
-
-
21144438831
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Springer-Verlag, Berlin
-
WEIS, S., SARMA, S., RIVEST, R., AND ENGELS, D. 2003. Security and privacy aspects of low-cost radio frequency identification systems. In Proceedings of the International Conference on Security in Pervasive Computing (SPC'03). Springer-Verlag, Berlin, 454-469.
-
(2003)
Proceedings of the International Conference on Security in Pervasive Computing (SPC'03)
, pp. 454-469
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
|