-
1
-
-
77049119125
-
-
Avoine, G.: Adversarial model for radio frequency identification. Cryptology ePrint Archive, Report 2005/049 (2005), http://eprint.iacr.org/2005/ 049
-
Avoine, G.: Adversarial model for radio frequency identification. Cryptology ePrint Archive, Report 2005/049 (2005), http://eprint.iacr.org/2005/ 049
-
-
-
-
2
-
-
34748832806
-
Defining strong privacy for RFID. Cryptology ePrint Archive
-
Report 2006/137
-
Juels, A.,Weis, S.A.: Defining strong privacy for RFID. Cryptology ePrint Archive, Report 2006/137 (2006), http://eprint.iacr.org/2006/137
-
(2006)
-
-
Juels, A.1
Weis, S.A.2
-
4
-
-
55649115408
-
Provably secure ubiquitous systems: Universally composable RFID authentication protocols
-
SecureComm, pp, IEEE Computer Society, Los Alamitos
-
Burmester, M., van Le, T., de Medeiros, B.: Provably secure ubiquitous systems: Universally composable RFID authentication protocols. In: Proceedings of Second International Conference on Security and Privacy in Communication Networks (SecureComm), pp. 1-9. IEEE Computer Society, Los Alamitos (2006)
-
(2006)
Proceedings of Second International Conference on Security and Privacy in Communication Networks
, pp. 1-9
-
-
Burmester, M.1
van Le, T.2
de Medeiros, B.3
-
5
-
-
38149038702
-
On privacy models for RFID
-
Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
-
Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68-87. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 68-87
-
-
Vaudenay, S.1
-
6
-
-
57049184162
-
RFID privacy models revisited
-
Jajodia, S, Lopez, J, eds, ESORICS 2008, Springer, Heidelberg
-
Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: RFID privacy models revisited. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 251-266. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 251-266
-
-
Ng, C.Y.1
Susilo, W.2
Mu, Y.3
Safavi-Naini, R.4
-
8
-
-
71549125572
-
Anonymizer-enabled security and privacy for rfid
-
Leuven, Belgium
-
Sadeghi, A., Visconti, I.,Wachsmann, C.: Anonymizer-enabled security and privacy for rfid. In: Conference on RFID Security 2009, Leuven, Belgium (2009)
-
(2009)
Conference on RFID Security
-
-
Sadeghi, A.1
Visconti, I.2
Wachsmann, C.3
-
9
-
-
80052993333
-
User privacy in transport systems based on RFID e-tickets
-
PiLBA, Malaga, Spain, October 9
-
Sadeghi, A., Visconti, I., Wachsmann, C.: User privacy in transport systems based on RFID e-tickets. In: International Workshop on Privacy in Location-Based Applications (PiLBA), Malaga, Spain, October 9 (2008)
-
(2008)
International Workshop on Privacy in Location-Based Applications
-
-
Sadeghi, A.1
Visconti, I.2
Wachsmann, C.3
-
12
-
-
84937407719
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
-
Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, p. 531. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 531
-
-
Bellare, M.1
Namprempre, C.2
|