-
3
-
-
26444478592
-
RFID traceability: A multilayer problem
-
A. Patrick and M. Yung, editors, of LNCS, Springer
-
G. Avoine and P. Oechslin. RFID traceability: A multilayer problem. In A. Patrick and M. Yung, editors, Proceedings of Financial Cryptography 2005, volume 3570 of LNCS, pages 125-140. Springer, 2005.
-
(2005)
Proceedings of Financial Cryptography 2005
, vol.3570
, pp. 125-140
-
-
Avoine, G.1
Oechslin, P.2
-
4
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
J. Kilian, editor
-
D. Boneh, E.-J. Goh, and K. Nissim. Evaluating 2-DNF formulas on ciphertexts. In J. Kilian, editor, Proceedings of the Theory of Cryptography Conference, volume 3378 of LNCS, pages 325-342, 2005.
-
(2005)
Proceedings of the Theory of Cryptography Conference, Volume 3378 of LNCS
, pp. 325-342
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
5
-
-
84957868624
-
An information-theoretic model for steganography
-
D. Aucsmith, editor, of LNCS, Springer
-
C. Cachin. An information-theoretic model for steganography. In D. Aucsmith, editor, Proceedings of Information Hiding 1998, volume 1525 of LNCS, pages 306-318. Springer, 1998.
-
(1998)
Proceedings of Information Hiding 1998
, vol.1525
, pp. 306-318
-
-
Cachin, C.1
-
6
-
-
84948973494
-
Exposure-resilient functions and all-or-nothing transforms
-
B. Preneel, editor, of LNCS, Springer
-
R. Canetti, Y. Dodis, S. Halevi, E. Kushilevitz, and A. Sahai. Exposure-resilient functions and all-or-nothing transforms. In B. Preneel, editor, Proceedings of Eurocrypt 2000, volume 1807 of LNCS, pages 453-469. Springer, 2000.
-
(2000)
Proceedings of Eurocrypt 2000
, vol.1807
, pp. 453-469
-
-
Canetti, R.1
Dodis, Y.2
Halevi, S.3
Kushilevitz, E.4
Sahai, A.5
-
7
-
-
33750067964
-
Auditable privacy: On tamper-evident mix networks
-
G. D. Crescenzo and A. Rubin, editors, of LNCS, Springer
-
J. Y. Choi, P. Golle, and M. Jakobsson. Auditable privacy: On tamper-evident mix networks. In G. D. Crescenzo and A. Rubin, editors, Proceedings of Financial Cryptography 2006, volume 4107 of LNCS, pages 126-141. Springer, 2006.
-
(2006)
Proceedings of Financial Cryptography 2006
, vol.4107
, pp. 126-141
-
-
Choi, J.Y.1
Golle, P.2
Jakobsson, M.3
-
9
-
-
35048899238
-
Universal re-encryption for mixnets
-
T. Okamoto, editor
-
P. Golle, M. Jakobsson, A. Juels, and P. Syverson. Universal re-encryption for mixnets. In T. Okamoto, editor, RSA Conference - Cryptographers' Track, volume 2964 of LNCS, pages 163-178, 2004.
-
(2004)
RSA Conference - Cryptographers' Track, Volume 2964 of LNCS
, pp. 163-178
-
-
Golle, P.1
Jakobsson, M.2
Juels, A.3
Syverson, P.4
-
10
-
-
33750442580
-
The security implications of verichip cloning
-
J. Halamka, A. Juels, A. Stubblefield, and J. Westhues. The security implications of VeriChip cloning. Journal of the American Medical Informatics Association, 13 (6):601-607, 2006.
-
(2006)
Journal of the American Medical Informatics Association
, vol.13
, Issue.6
, pp. 601-607
-
-
Halamka, J.1
Juels, A.2
Stubblefield, A.3
Westhues, J.4
-
11
-
-
84937438364
-
Provably secure steganography
-
M. Yung, editor, of LNCS, Springer
-
N. Hopper, J. Langford, and L. von Ahn. Provably secure steganography. In M. Yung, editor, Proceedings of Crypto 2002, volume 2442 of LNCS, pages 77-92. Springer, 2002.
-
(2002)
Proceedings of Crypto 2002
, vol.2442
, pp. 77-92
-
-
Hopper, N.1
Langford, J.2
Von Ahn, L.3
-
12
-
-
77952392875
-
-
E. Inc. Class 1 generation 2 UHF air interface protocol standard version 1.0.9. Referenced 2007 at
-
E. Inc. Class 1 generation 2 UHF air interface protocol standard version 1.0.9. Referenced 2007 at http://www.epcglobalinc.com/standards-technology/ EPCglobalClass-1Generation-2UHFRFIDProtocolV109pdf.
-
-
-
-
13
-
-
20844453821
-
Minimalist cryptography for RFID tags
-
A. Juels. Minimalist cryptography for RFID tags. In SCN '04, pages 149-164, 2004.
-
(2004)
SCN '04
, pp. 149-164
-
-
Juels, A.1
-
14
-
-
33144457479
-
RFID security and privacy: A research survey
-
February
-
A. Juels. RFID security and privacy: A research survey. J-SAC, 24 (2):381-394, February 2006.
-
(2006)
J-SAC
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
15
-
-
20844459862
-
RFID privacy: An overview of problems and proposed solutions
-
May/June
-
A. Juels, S. Garfinkel, and R. Pappu. RFID privacy: An overview of problems and proposed solutions. IEEE Security and Privacy, 3 (3):34-43, May/June 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 34-43
-
-
Juels, A.1
Garfinkel, S.2
Pappu, R.3
-
16
-
-
77952361468
-
RSA key generation with verifiable randomness
-
D. Naccache and P. Paillier, editors, of LNCS, Springer
-
A. Juels and J. Guajardo. RSA key generation with verifiable randomness. In D. Naccache and P. Paillier, editors, Proceedings of PKC 2002, volume 2274 of LNCS, pages 72-86. Springer, 2002.
-
(2002)
Proceedings of PKC 2002
, vol.2274
, pp. 72-86
-
-
Juels, A.1
Guajardo, J.2
-
17
-
-
18744409344
-
The blocker tag: Selective blocking of RFID tags for consumer privacy
-
V. Atluri, editor, ACM Press
-
A. Juels, R. Rivest, and M. Szydlo. The blocker tag: Selective blocking of RFID tags for consumer privacy. In V. Atluri, editor, Proceedings of ACM CCS 2003, pages 103-111. ACM Press, 2003.
-
(2003)
Proceedings of ACM CCS 2003
, pp. 103-111
-
-
Juels, A.1
Rivest, R.2
Szydlo, M.3
-
18
-
-
33144459893
-
High-power proxies for enhancing RFID privacy and utility
-
G. Danezis and D. Martin, editors
-
A. Juels, P. Syverson, and D. Bailey. High-power proxies for enhancing RFID privacy and utility. In G. Danezis and D. Martin, editors, Privacy Enhancing Technologies (PET), 2005.
-
(2005)
Privacy Enhancing Technologies (PET)
-
-
Juels, A.1
Syverson, P.2
Bailey, D.3
-
20
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
-
N. Koblitz, editor, of LNCS, Springer
-
P. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In N. Koblitz, editor, Proceedings of Crypto 1996, volume 1109 of LNCS, pages 104-113. Springer, 1996.
-
(1996)
Proceedings of Crypto 1996
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
21
-
-
33748680791
-
Collusion-free protocols
-
H. Gabow and R. Fagin, editors, ACM
-
M. Lepinski, S. Micali, and A. Shelat. Collusion-free protocols. In H. Gabow and R. Fagin, editors, Proceedings of STOC 2005, pages 543-552. ACM, 2005.
-
(2005)
Proceedings of STOC 2005
, pp. 543-552
-
-
Lepinski, M.1
Micali, S.2
Shelat, A.3
-
22
-
-
33749013010
-
Privacy for RFID through trusted computing (short paper)
-
S. D. C. di Vimercati and R. Dingledine, editors
-
D. Molnar, A. Soppera, and D. Wagner. Privacy for RFID through trusted computing (short paper). In S. D. C. di Vimercati and R. Dingledine, editors, Proceedings of WPES, 2005.
-
(2005)
Proceedings of WPES
-
-
Molnar, D.1
Soppera, A.2
Wagner, D.3
-
23
-
-
33745597876
-
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
-
B. Preneel and S. Tavares, editors, LNCS. Springer
-
D. Molnar, A. Soppera, and D. Wagner. A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In B. Preneel and S. Tavares, editors, SAC '05, LNCS. Springer, 2005.
-
(2005)
SAC '05
-
-
Molnar, D.1
Soppera, A.2
Wagner, D.3
-
24
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
B. Pfitzmann and P. McDaniel, editors, ACM Press
-
D. Molnar and D. Wagner. Privacy and security in library RFID: Issues, practices, and architectures. In B. Pfitzmann and P. McDaniel, editors, Proceedings of ACM CCS 2004, pages 210-219. ACM Press, 2004.
-
(2004)
Proceedings of ACM CCS 2004
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
25
-
-
77952345517
-
Elliptic curves and MRTDs
-
Slide presentation
-
K. Nguyen. Elliptic curves and MRTDs. In Interfest Singapore, 2005. Slide presentation.
-
(2005)
Interfest Singapore
-
-
Nguyen, K.1
-
27
-
-
26444435642
-
RFID guardian: A battery-powered mobile device for RFID privacy management
-
C. Boyd and J. M. González Nieto, editors, of LNCS, Springer
-
M. Rieback, B. Crispo, and A. Tanenbaum. RFID Guardian: A battery-powered mobile device for RFID privacy management. In C. Boyd and J. M. González Nieto, editors, ACISP '05, volume 3574 of LNCS, pages 184-194. Springer, 2005.
-
(2005)
ACISP '05
, vol.3574
, pp. 184-194
-
-
Rieback, M.1
Crispo, B.2
Tanenbaum, A.3
-
29
-
-
13444297889
-
Towards the five-cent tag
-
MIT Auto ID Center
-
S. Sarma. Towards the five-cent tag. Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center, 2001. Available from http://www.epcglobalinc.org.
-
(2001)
Technical Report MIT-AUTOID-WH-006
-
-
Sarma, S.1
-
30
-
-
2942593615
-
Radio-frequency identification systems
-
B. S. Kaliski Jr., Ç. K. Koç, and C. Paar, editors, of LNCS, Springer
-
S. E. Sarma, S. A. Weis, and D. Engels. Radio-frequency identification systems. In B. S. Kaliski Jr., Ç. K. Koç, and C. Paar, editors, Workshop on Cryptographic Hardware and Embedded Systems - CHES '02, volume 2523 of LNCS, pages 454-469. Springer, 2002.
-
(2002)
Workshop on Cryptographic Hardware and Embedded Systems - CHES '02
, vol.2523
, pp. 454-469
-
-
Sarma, S.E.1
Weis, S.A.2
Engels, D.3
-
31
-
-
0001217738
-
The prisoners' problem and the subliminal channel
-
D. Chaum, editor, Plenum Press
-
G. Simmons. The prisoners' problem and the subliminal channel. In D. Chaum, editor, Proceedings of Crypto 1983, pages 51-67. Plenum Press, 1983.
-
(1983)
Proceedings of Crypto 1983
, pp. 51-67
-
-
Simmons, G.1
-
32
-
-
84985824882
-
The subliminal channel and digital signatures
-
T. Beth, N. Cot, and I. Ingemarsson, editors, of LNCS, Springer
-
G. Simmons. The subliminal channel and digital signatures. In T. Beth, N. Cot, and I. Ingemarsson, editors, Proceedings of Eurocrypt 1984, volume 0209 of LNCS, pages 364-378. Springer, 1984.
-
(1984)
Proceedings of Eurocrypt 1984
, vol.209
, pp. 364-378
-
-
Simmons, G.1
-
33
-
-
84978194862
-
Subliminal communication is easy using the DSA
-
T. Helleseth, editor, of LNCS, Springer
-
G. Simmons. Subliminal communication is easy using the DSA. In T. Helleseth, editor, Proceedings of Eurocrypt 1993, volume 765 of LNCS, pages 218-232. Springer, 1993.
-
(1993)
Proceedings of Eurocrypt 1993
, vol.765
, pp. 218-232
-
-
Simmons, G.1
-
34
-
-
84955586344
-
The dark side of black-box cryptography, or: Should we trust capstone?
-
N. Koblitz, editor, of LNCS. Springer
-
A. Young and M. Yung. The dark side of black-box cryptography, or: Should we trust capstone? In N. Koblitz, editor, Proceedings of Crypto 1996, volume 1109 of LNCS. Springer, 1996.
-
(1996)
Proceedings of Crypto 1996
, vol.1109
-
-
Young, A.1
Yung, M.2
-
35
-
-
84957360674
-
Kleptography: Using cryptography against cryptography
-
W. Fumy, editor, of LNCS. Springer
-
A. Young and M. Yung. Kleptography: Using cryptography against cryptography. In W. Fumy, editor, Proceedings of Eurocrypt 1993, volume 1233 of LNCS. Springer, 1997.
-
(1997)
Proceedings of Eurocrypt 1993
, vol.1233
-
-
Young, A.1
Yung, M.2
|