-
1
-
-
85031620050
-
A semantics for a logic of authentication
-
Montreal, Canada
-
Abadi, M. and Tuttle, M. (1991) 'A semantics for a logic of authentication', Proc. 10th Annual ACM Symposium on Principles of Distributed Computing, Montreal, Canada, pp.201-216.
-
(1991)
Proc. 10th Annual ACM Symposium on Principles of Distributed Computing
, pp. 201-216
-
-
Abadi, M.1
Tuttle, M.2
-
2
-
-
77949676803
-
Key agreement, the algebraic eraserTM, and lightweight cryptography
-
Anshel, I., Anshel, M., Goldfeld, D. and Lemieux, S. (2006) 'Key agreement, the algebraic eraserTM, and lightweight cryptography', J. Contemporary Mathematics, Vol.418, pp.1-34.
-
(2006)
J. Contemporary Mathematics
, vol.418
, pp. 1-34
-
-
Anshel, I.1
Anshel, M.2
Goldfeld, D.3
Lemieux, S.4
-
5
-
-
55649115408
-
-
IACR ePrint Report, 2006/131.pdf
-
Burmester, M., Le, T.V. and Medeiros, B. (2006) Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols, IACR ePrint Report, 2006/131.pdf.
-
(2006)
Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols
-
-
Burmester, M.1
Le, T.V.2
Medeiros, B.3
-
6
-
-
0024880585
-
A logic of authentication
-
December, Litchfield Park, Arizona
-
Burrows, M., Abadi, M. and Needham, R. (1989) 'A logic of authentication', Proc. 12th ACM Symposium on Operating System Principles, December, Litchfield Park, Arizona, pp.1-13.
-
(1989)
Proc. 12th ACM Symposium on Operating System Principles
, pp. 1-13
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
7
-
-
33750568156
-
Formal analysis of Kerberos 5
-
Butler, F., Cervesato, I., Jaggard, A., Scedrov, A. and Walstad, C. (2006) 'Formal analysis of Kerberos 5', Theor. Comp. Sci., Special, Vol.367, No.1, pp.57-87.
-
(2006)
Theor. Comp. Sci., Special
, vol.367
, Issue.1
, pp. 57-87
-
-
Butler, F.1
Cervesato, I.2
Jaggard, A.3
Scedrov, A.4
Walstad, C.5
-
8
-
-
34547630116
-
-
Florida State University Computer Science Department, Tallahassee, FL
-
Chatmon, C., Le, T.V. and Burmester, M. (2006) Secure Anonymous RFID Authentication Protocols, Technical Report, TR-060112, Florida State University Computer Science Department, Tallahassee, FL, pp.1-10.
-
(2006)
Secure Anonymous RFID Authentication Protocols, Technical Report, TR-060112
, pp. 1-10
-
-
Chatmon, C.1
Le, T.V.2
Burmester, M.3
-
9
-
-
33744940544
-
Efficient RFID authentication protocol for ubiquitous computing environment
-
Nagasaki, Japan
-
Choi, E.Y., Lee, S.M. and Lee, D.H. (2005) 'Efficient RFID authentication protocol for ubiquitous computing environment', Proc. SECUBIQ'05, LNCS 3823, Nagasaki, Japan, pp.945-954.
-
(2005)
Proc SECUBIQ'05, LNCS 3823
, pp. 945-954
-
-
Choi, E.Y.1
Lee, S.M.2
Lee, D.H.3
-
10
-
-
33144487342
-
-
IACR ePrint Report, 2005/237.pdf
-
Gilbert, H., Robshaw, M. and Sibert, H. (2005) An Active Attack against HB+ - A Provably Secure Lightweight Authentication Protocol, IACR ePrint Report, 2005/237.pdf.
-
(2005)
An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol
-
-
Gilbert, H.1
Robshaw, M.2
Sibert, H.3
-
11
-
-
51149098609
-
Improved lightweight mutual authentication protocol for RFID systems
-
Wireless and Mobile Networking, Boston, Springer
-
Gódor, G. and Antal, M. (2008) 'Improved lightweight mutual authentication protocol for RFID systems', IFIP International Federation for Information Processing, Vol.284, Wireless and Mobile Networking, Boston, Springer, pp.471-482.
-
(2008)
IFIP International Federation for Information Processing
, vol.284
, pp. 471-482
-
-
Gódor, G.1
Antal, M.2
-
12
-
-
0025023289
-
Reasoning about belief in cryptographic protocols
-
Oakland, CA
-
Gong, L., Needham, R. and Yahalom, R. (1990) 'Reasoning about belief in cryptographic protocols', Proc. IEEE Symposium on Research in Security and Privacy, IEEE Computer Society, Oakland, CA, pp.234-248.
-
(1990)
Proc IEEE Symposium on Research in Security and Privacy, IEEE Computer Society
, pp. 234-248
-
-
Gong, L.1
Needham, R.2
Yahalom, R.3
-
13
-
-
38549103545
-
Security analysis and enhancement of one-way hash based low-cost authentication protocol
-
Nanjing, China
-
Ha, J., Moon, S., Nieto, J.M. and Boyd, C. (2007) 'Security analysis and enhancement of one-way hash based low-cost authentication protocol (OHLCAP)', Proc. PAKDD'07, LNAI 4819, Nanjing, China, pp.574-583.
-
(2007)
Proc PAKDD'07, LNAI 4819
, pp. 574-583
-
-
Ha, J.1
Moon, S.2
Nieto, J.M.3
Boyd, C.4
-
14
-
-
45749153036
-
PUF-HB: A tamperresilient HB based authentication protocol
-
New York, NY
-
Hammouri, G. and Sunar, B. (2008) 'PUF-HB: a tamperresilient HB based authentication protocol', Proc. ACNS'08, LNCS 5037, New York, NY, pp.346-365.
-
(2008)
Proc ACNS'08, LNCS 5037
, pp. 346-365
-
-
Hammouri, G.1
Sunar, B.2
-
15
-
-
2942625823
-
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
-
Orlando, FL
-
Henrici, D. and Muller, D. (2004) 'Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers', Proc. IEEE PERCOMW'04, Orlando, FL, pp.149-153.
-
(2004)
Proc IEEE PERCOMW'04
, pp. 149-153
-
-
Henrici, D.1
Muller, D.2
-
16
-
-
70349284581
-
Secure human identification protocols
-
Gold Coast, Australia
-
Hopper, N. and Blum, M. (2001) 'Secure human identification protocols', Proc. ASIACRYPT'01, LNCS 2248, Gold Coast, Australia, pp.52-66.
-
(2001)
Proc ASIACRYPT'01, LNCS 2248
, pp. 52-66
-
-
Hopper, N.1
Blum, M.2
-
19
-
-
77951595476
-
Unidirectional key distribution across time and space with applications to RFID security
-
San Jose, CA
-
Juels, A., Pappu, R. and Parno, B. (2008) 'Unidirectional key distribution across time and space with applications to RFID security', Proc. USENIX Security Symposium 2008, San Jose, CA, pp.75-90.
-
(2008)
Proc USENIX Security Symposium 2008
, pp. 75-90
-
-
Juels, A.1
Pappu, R.2
Parno, B.3
-
20
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
Santa Barbara, CA
-
Juels, A. and Weis, S. (2005) 'Authenticating pervasive devices with human protocols', Proc. CRYPTO'05, LNAI 3621, Santa Barbara, CA, pp.293-308.
-
(2005)
Proc CRYPTO'05, LNAI 3621
, pp. 293-308
-
-
Juels, A.1
Weis, S.2
-
21
-
-
34748848124
-
Universally composable and forward-secure RFID authentication and authenticated key exchange
-
Singapore
-
Le, T.V., Burmester, M. and Medeiros, B. (2007) 'Universally composable and forward-secure RFID authentication and authenticated key exchange', Proc. ASIACCS'07, ACM, Singapore, pp.242-252.
-
(2007)
Proc ASIACCS'07, ACM
, pp. 242-252
-
-
Le, T.V.1
Burmester, M.2
Medeiros, B.3
-
22
-
-
24944582157
-
Efficient authentication for low-cost RFID systems
-
Singapore
-
Lee, S.M., Hwang Y.J., Lee, D.H. and Lim, J.I. (2005) 'Efficient authentication for low-cost RFID systems', Proc. ICCSA'05, LNCS 3480, Singapore, pp.619-627.
-
(2005)
Proc ICCSA'05, LNCS 3480
, pp. 619-627
-
-
Lee, S.M.1
Hwang, Y.J.2
Lee, D.H.3
Lim, J.I.4
-
23
-
-
34548162681
-
Vulnerability analysis of EMAP - An efficient RFID mutual authentication protocol
-
Vienna, Austria
-
Li, T. and Deng, R. (2007) 'Vulnerability analysis of EMAP - an efficient RFID mutual authentication protocol', Proc. Second International Conference on Availability, Reliability and Security - AReS'07, Vienna, Austria, pp.238-245.
-
(2007)
Proc Second International Conference on Availability, Reliability and Security - AReS'07
, pp. 238-245
-
-
Li, T.1
Deng, R.2
-
24
-
-
0029719080
-
Some new attacks upon security protocols
-
IEEE Computer Society Press, Venice, Italy
-
Lowe, G. (1996) 'Some new attacks upon security protocols', Proc. Ninth IEEE Computer Security Foundations Workshop - CSFW'96, IEEE Computer Society Press, Venice, Italy, pp.162-169.
-
(1996)
Proc Ninth IEEE Computer Security Foundations Workshop - CSFW'96
, pp. 162-169
-
-
Lowe, G.1
-
25
-
-
84886218215
-
Public key cryptography and RFID tags
-
San Francisco, CA
-
McLoone, M. and Robshaw, M.J.B. (2007) 'Public key cryptography and RFID tags', Proc. CT-RSA'07, LNCS 4377, San Francisco, CA, pp.372-384.
-
(2007)
Proc CT-RSA'07, LNCS 4377
, pp. 372-384
-
-
McLoone, M.1
Robshaw, M.J.B.2
-
26
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
Meadows, C. (1994) 'The NRL protocol analyzer: an overview', J. Logic Program, Vol.26, No.2, pp.113-131.
-
(1994)
J. Logic Program
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
27
-
-
0030705405
-
Automated analysis of cryptographic protocols using murphi
-
IEEE Computer Society Press, Silver Spring, MD
-
Mitchell, J., Mitchell, M. and Stern, U. (1997) 'Automated analysis of cryptographic protocols using murphi', Proc. 16th IEEE Symposium on Security and Privacy - SSP'97, IEEE Computer Society Press, Silver Spring, MD, pp.141-151.
-
(1997)
Proc. 16th IEEE Symposium on Security and Privacy - SSP'97
, pp. 141-151
-
-
Mitchell, J.1
Mitchell, M.2
Stern, U.3
-
28
-
-
33845455482
-
EMAP: An efficient mutual authentication protocol for low-cost RFID tags
-
Montpellier, France
-
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J. and Ribagorda, A. (2006) 'EMAP: an efficient mutual authentication protocol for low-cost RFID tags', Proc. OTM Federated Conferences and Workshop: IS Workshop - IS'06, LNCS 4277, Montpellier, France, pp.352-361.
-
(2006)
Proc OTM Federated Conferences and Workshop: IS Workshop - IS'06, LNCS 4277
, pp. 352-361
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.3
Ribagorda, A.4
-
29
-
-
24644501824
-
Callenge-response based RFID authentication protocol for distributed database environment
-
Boppard, Germany
-
Rhee, K., Kwak, J., Kim, S. and Won, D. (2005) 'Callenge-response based RFID authentication protocol for distributed database environment', Proc. SPC'05, LNCS 3450, Boppard, Germany, pp.70-84.
-
(2005)
Proc SPC'05, LNCS 3450
, pp. 70-84
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
Won, D.4
-
30
-
-
35248872610
-
RFID systems and security and privacy implications
-
Redwood City, CA
-
Sarma, S.E., Weis, S.A. and Engels, D.W. (2002) 'RFID systems and security and privacy implications', Proc. CHES'02, LNCS 2523, Redwood City, CA, pp.454-469.
-
(2002)
Proc CHES'02, LNCS 2523
, pp. 454-469
-
-
Sarma, S.E.1
Weis, S.A.2
Engels, D.W.3
-
31
-
-
0000937825
-
Verifying authentication protocols in CSP
-
Schneider, S. (1998) 'Verifying authentication protocols in CSP', IEEE Transactions on Software Engineering, Vol.24, No.9, pp.741-758.
-
(1998)
IEEE Transactions on Software Engineering
, vol.24
, Issue.9
, pp. 741-758
-
-
Schneider, S.1
-
32
-
-
50249161524
-
SQUASH - A new MAC with provable security properties for highly constrained devices such as RFID tags
-
Lausanne, Switzerland
-
Shamir, A. (2008) 'SQUASH - a new MAC with provable security properties for highly constrained devices such as RFID tags', Proc. FSE'08, LNCS 5086, Lausanne, Switzerland, pp.144-157.
-
(2008)
Proc FSE'08, LNCS 5086
, pp. 144-157
-
-
Shamir, A.1
-
33
-
-
0027929693
-
On unifying some cryptographic protocols logics
-
IEEE Computer Society Press, Oakland, CA
-
Syverson, P.F. and Van Oorschot, P.C. (2004) 'On unifying some cryptographic protocols logics', Proc. 13th IEEE Symposium on Security and Privacy - SSP'04, IEEE Computer Society Press, Oakland, CA, pp.14-28.
-
(2004)
Proc. 13th IEEE Symposium on Security and Privacy - SSP'04
, pp. 14-28
-
-
Syverson, P.F.1
Van Oorschot, P.C.2
-
34
-
-
33750290259
-
YA-TRAP: Yet another trivial RFID authentication protocol
-
PerCom'06, Pisa, Italy
-
Tsudik, G. (2006) 'YA-TRAP: yet another trivial RFID authentication protocol', Proc. International Conference on Pervasive Computing and Communications, PerCom'06, Pisa, Italy, pp.640-643.
-
(2006)
Proc International Conference on Pervasive Computing and Communications
, pp. 640-643
-
-
Tsudik, G.1
-
35
-
-
34547414125
-
RFID privacy based on public-key cryptography
-
Vaudenay, S. (2006) 'RFID privacy based on public-key cryptography', Proc. ICISC'06, LNCS 4296, Busan, Korea, pp.1-6.
-
(2006)
Proc ICISC'06, LNCS 4296, Busan, Korea
, pp. 1-6
-
-
Vaudenay, S.1
-
36
-
-
33749379761
-
Mutual authentication protocol for low-cost RFID
-
Graz, Austria
-
Yang, J., Park, J., Lee, H., Ren, K. and Kim, K. (2005) 'Mutual authentication protocol for low-cost RFID', Proc. Ecrypt Workshop on RFID and Lightweight Crypto, Graz, Austria, pp.1-8.
-
(2005)
Proc Ecrypt Workshop on RFID and Lightweight Crypto
, pp. 1-8
-
-
Yang, J.1
Park, J.2
Lee, H.3
Ren, K.4
Kim, K.5
|