-
2
-
-
38949171391
-
Security and Privacy on Authentication Protocol for Low-cost RFID
-
Li, Y.Z., Cho, Y.B., Um, N.K., and Lee, S.H. (2006): Security and Privacy on Authentication Protocol for Low-cost RFID. 2006 International Conference on Computational Intelligence and Security. 2:3-6.
-
(2006)
2006 International Conference on Computational Intelligence and Security
, vol.2
, pp. 3-6
-
-
Li, Y.Z.1
Cho, Y.B.2
Um, N.K.3
Lee, S.H.4
-
3
-
-
35048904109
-
Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags
-
3207
-
Saito, J., Ryou, J.C., and Sakurai, K. (2004): Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags. EUC 2004, LNCS 3207. 879-890.
-
(2004)
LNCS
, vol.EUC 2004
, pp. 879-890
-
-
Saito, J.1
Ryou, J.C.2
Sakurai, K.3
-
4
-
-
21144438831
-
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
-
Weis, S.A., Sanma, S.E., Rivest, R.L., and Engels, D.W. (2003): Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. 1st International Conference on Security in Pervasive Computing.
-
(2003)
1st International Conference on Security in Pervasive Computing
-
-
Weis, S.A.1
Sanma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
6
-
-
34247264920
-
Symmetric Encryption in RFID Authentication Protocol for Strong Location Privacy and Forward-Security
-
Kim, H.W., Lim, S.Y., and Lee, H.J. (2006): Symmetric Encryption in RFID Authentication Protocol for Strong Location Privacy and Forward-Security. 2006 International Conference on Hybrid Information Technology (ICHIT'06). 2:718-723.
-
(2006)
2006 International Conference on Hybrid Information Technology (ICHIT'06)
, vol.2
, pp. 718-723
-
-
Kim, H.W.1
Lim, S.Y.2
Lee, H.J.3
-
7
-
-
57149100147
-
An Efficient and Secure RFID Security Method with Ownership Transfer
-
Osaka, K., Takagi, T., Yamazaki, K., and Takahashi, O. (2006): An Efficient and Secure RFID Security Method with Ownership Transfer. 2006 International Conference on Computational Intelligence and Security, 2:1090-1095.
-
(2006)
2006 International Conference on Computational Intelligence and Security
, vol.2
, pp. 1090-1095
-
-
Osaka, K.1
Takagi, T.2
Yamazaki, K.3
Takahashi, O.4
-
8
-
-
34547265683
-
Design of an Extended Architecture for Secure Low-Cost 900MHz UHF Mobile RFID Systems
-
Park, N., Kim, H., Chung, K., and Sohn, S. (2006): Design of an Extended Architecture for Secure Low-Cost 900MHz UHF Mobile RFID Systems. 2006 IEEE 10th International Symposium on Consumer Electronics (ISCE '06). 1-6.
-
(2006)
2006 IEEE 10th International Symposium on Consumer Electronics (ISCE '06)
, pp. 1-6
-
-
Park, N.1
Kim, H.2
Chung, K.3
Sohn, S.4
-
9
-
-
47849119135
-
A Security and Privacy Enhanced Protection Scheme for Secure 900MHz UHF RFID Reader on Mobile Phone
-
Park, N., Lee, H., Kim, H., and Won, D. (2006): A Security and Privacy Enhanced Protection Scheme for Secure 900MHz UHF RFID Reader on Mobile Phone. 2006 IEEE Tenth International Symposium on Consumer Electronics (ISCE '06). 1-5.
-
(2006)
2006 IEEE Tenth International Symposium on Consumer Electronics (ISCE '06)
, pp. 1-5
-
-
Park, N.1
Lee, H.2
Kim, H.3
Won, D.4
-
10
-
-
33749068825
-
A Random ID Update Scheme to Protect Location Privacy in RFID-based Student Administration Systems
-
Ma, J., Nakamura, A., and Huang, R. (2005): A Random ID Update Scheme to Protect Location Privacy in RFID-based Student Administration Systems. Database and Expert Systems Applications. 22-26.
-
(2005)
Database and Expert Systems Applications
, pp. 22-26
-
-
Ma, J.1
Nakamura, A.2
Huang, R.3
-
11
-
-
67650085422
-
An Enumeration of RFID Related Threats
-
Schaberreiter, T. Wieser, C. Sanchez, I. Riekki, J. Roning, J. (2008): An Enumeration of RFID Related Threats. Mobile Ubiquitous Computing, Systems, Services and Technologies, 2008. (UBICOMM '08). 381-389
-
(2008)
Mobile Ubiquitous Computing, Systems, Services and Technologies, 2008. (UBICOMM '08)
, pp. 381-389
-
-
Schaberreiter, T.1
Wieser, C.2
Sanchez, I.3
Riekki, J.4
Roning, J.5
-
13
-
-
67650005624
-
-
May, Online].Available
-
J. Westhues. (2008, May) Proximity cards. [Online].Available: http://cq.cx/prox.pl
-
(2008)
Proximity cards
-
-
Westhues, J.1
|