-
1
-
-
38048999003
-
Data Management in RFID Applications
-
International Conference on Database and Expert Systems Applications
-
D. Lin, H. G. Elmongui, E. Bertino, and B. C. Ooi, "Data Management in RFID Applications", International Conference on Database and Expert Systems Applications, LNCS 4653, pp. 434-444, 2007.
-
(2007)
LNCS
, vol.4653
, pp. 434-444
-
-
Lin, D.1
Elmongui, H.G.2
Bertino, E.3
Ooi, B.C.4
-
2
-
-
33845531085
-
Radio frequency identification: Adversary model and attacks on existing protocols
-
Technical Report LASEC-REPORT-2005-001, EPFL, Lausanne, Switzerland, September
-
G. Avoine. "Radio frequency identification: adversary model and attacks on existing protocols", Technical Report LASEC-REPORT-2005-001, EPFL, Lausanne, Switzerland, September 2005.
-
(2005)
-
-
Avoine, G.1
-
3
-
-
24644501824
-
Challenge-Response Based on RFID Authentication Protocol for Distributed Database Environment
-
SPC 2005
-
K. Rhee, J. Kwak, S. Kim and D. Won, "Challenge-Response Based on RFID Authentication Protocol for Distributed Database Environment", SPC 2005, LNCS 3450, pp. 70-84, 2005.
-
(2005)
LNCS
, vol.3450
, pp. 70-84
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
Won, D.4
-
4
-
-
34247218520
-
RFID Mutual Authentication Scheme based on Synchronized Secret Information
-
S. Lee, T. Asano and K. Kim, "RFID Mutual Authentication Scheme based on Synchronized Secret Information", SCIS'06, 2006.
-
(2006)
SCIS'06
-
-
Lee, S.1
Asano, T.2
Kim, K.3
-
5
-
-
38149047468
-
Low-Cost and Strong-Security RFID Authentication Protocol
-
EUC Workshops 2007
-
J.C. Ha, S.J. Moon, J. M. G. Nieto and C. Boyd, "Low-Cost and Strong-Security RFID Authentication Protocol", EUC Workshops 2007, LNCS 4809, pp. 795-807, 2007.
-
(2007)
LNCS
, vol.4809
, pp. 795-807
-
-
Ha, J.C.1
Moon, S.J.2
Nieto, J.M.G.3
Boyd, C.4
-
6
-
-
48049085420
-
RFID Protocol enabling Ownership Transfer to protect against Traceability and DoS attacks
-
H. Lei, T.J. Cao, "RFID Protocol enabling Ownership Transfer to protect against Traceability and DoS attacks", International Symposium on Data, Privacy, & E-Commerce, pp. 508-510, 2007.
-
(2007)
International Symposium on Data, Privacy, & E-Commerce
, pp. 508-510
-
-
Lei, H.1
Cao, T.J.2
-
8
-
-
56749103027
-
-
B. Song, C. Mitchell, RFID authentication protocol for low-cost tags, First ACM Conference on Wireless Security, WiSec 2008, pp.40-147, 2008.
-
B. Song, C. Mitchell, "RFID authentication protocol for low-cost tags", "First ACM Conference on Wireless Security", WiSec 2008, pp.40-147, 2008.
-
-
-
-
9
-
-
36248971663
-
LMAP: A Real Lightweight Mutual Authentication Protocol for Low-Cost RFID Tags
-
July
-
P. Peris-Lopez, J. Hernandez-Castro, J. Estevez-Tapiador, and A. Ribagorda, "LMAP: A Real Lightweight Mutual Authentication Protocol for Low-Cost RFID Tags", Second Workshop RFID Security, July 2006.
-
(2006)
Second Workshop RFID Security
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.2
Estevez-Tapiador, J.3
Ribagorda, A.4
-
10
-
-
36248982045
-
SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity
-
H. -Y. Chien, "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity", IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 4, 2007, pp. 337-340.
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.4
, pp. 337-340
-
-
Chien, H.-Y.1
-
12
-
-
60449095092
-
Security Analysis of the SASI Protocol
-
20 May, IEEE Computer Society Digital Library. IEEE Computer Society, 26 May 2008
-
T. Cao, E. Bertino, H. Lei, "Security Analysis of the SASI Protocol", IEEE Transactions on Dependable and Secure Computing, 20 May 2008. IEEE Computer Society Digital Library. IEEE Computer Society, 26 May 2008 http://doi.ieeecomputersociety.org /10.1109/TDSC.2008.32
-
(2008)
IEEE Transactions on Dependable and Secure Computing
-
-
Cao, T.1
Bertino, E.2
Lei, H.3
-
13
-
-
78651592502
-
A novel mutual authentication scheme based on quadratic residues
-
J.-S. Chou, G.-C. Lee, C.-J. Chan, "A novel mutual authentication scheme based on quadratic residues", Cryptology ePrint Archive, http://eprint.iacr.org/2007/224
-
Cryptology ePrint Archive
-
-
Chou, J.-S.1
Lee, G.-C.2
Chan, C.-J.3
-
14
-
-
78651538368
-
Weaknesses of a Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems
-
Feb
-
H.-C. Hsiang, "Weaknesses of a Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems", 2008 RFID workshop, Feb. 2008
-
(2008)
2008 RFID workshop
-
-
Hsiang, H.-C.1
-
15
-
-
46749130059
-
A novel mutual authentication scheme based on quadratic residues
-
August
-
Y. Chen, "A novel mutual authentication scheme based on quadratic residues", Computer Network, Vol. 52, no. 12, pp. 2373-2380, August 2008.
-
(2008)
Computer Network
, vol.52
, Issue.12
, pp. 2373-2380
-
-
Chen, Y.1
|