-
1
-
-
34547688845
-
Public-key cryptography for RFID-tags
-
IEEE Computer Society, Washington, DC, USA
-
Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P. and Verbauwhede, I. (2007) 'Public-key cryptography for RFID-tags', Proc. 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07), IEEE Computer Society, Washington, DC, USA, pp.217-222.
-
(2007)
Proc. 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)
, pp. 217-222
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
2
-
-
34547623904
-
Physically unclonable function-based security and privacy in RFID systems
-
Bolotnyy, L. and Robins, G. (2007) 'Physically unclonable function-based security and privacy in RFID systems', Pervasive Computing and Communications, PerCom '07, 5th Annual IEEE International Conference, pp.211-220.
-
(2007)
Pervasive Computing and Communications, PerCom '07, 5th Annual IEEE International Conference
, pp. 211-220
-
-
Bolotnyy, L.1
Robins, G.2
-
3
-
-
84877887414
-
Security analysis of a cryptographicallyenabled RFID device
-
McDaniel, P. (Ed.) , USENIX
-
Bono, S., Green, M., Stubblefield, A., Juels, A., Rubin, A. and Szydlo, M. (2005) 'Security analysis of a cryptographicallyenabled RFID device', in McDaniel, P. (Ed.): 14th USENIX Security Symposium, USENIX, pp.1-16.
-
(2005)
14th USENIX Security Symposium
, pp. 1-16
-
-
Bono, S.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.5
Szydlo, M.6
-
4
-
-
74349115269
-
An RFID-based anti-counterfeiting system
-
Choi, S.H. and Poon, C.H. (2008) 'An RFID-based anti-counterfeiting system', IAENG International Journal of Computer Science (IJCS), Vol.35, No.1, pp.1-12.
-
(2008)
IAENG International Journal of Computer Science (IJCS)
, vol.35
, Issue.1
, pp. 1-12
-
-
Choi, S.H.1
Poon, C.H.2
-
5
-
-
33847330246
-
A lightweight RFID protocol to protect against traceability and cloning attacks
-
September
-
Dimitriou, T. (2005) 'A lightweight RFID protocol to protect against traceability and cloning attacks', Proceedings of SecureComm'05, September, pp.59-66.
-
(2005)
Proceedings of SecureComm'05
, pp. 59-66
-
-
Dimitriou, T.1
-
6
-
-
33750442580
-
Security implications of VeriChipTM cloning
-
Halamka, J., Juels, A., Stubblefield, A. and Westhues, J. (2006) 'Security implications of VeriChipTM cloning', Journal of the American Medical Informatics Association, Vol.13, No.6, pp.601-607.
-
(2006)
Journal of the American Medical Informatics Association
, vol.13
, Issue.6
, pp. 601-607
-
-
Halamka, J.1
Juels, A.2
Stubblefield, A.3
Westhues, J.4
-
7
-
-
43749090660
-
Consumer acceptance of RFID technology: An exploratory study
-
February
-
Hossain, M. and Prybutok, V. (2008) 'Consumer acceptance of RFID technology: an exploratory study', IEEE Transactions on Engineering Management, Vol.55, No.2, February, pp.316-328.
-
(2008)
IEEE Transactions on Engineering Management
, vol.55
, Issue.2
, pp. 316-328
-
-
Hossain, M.1
Prybutok, V.2
-
8
-
-
33645230759
-
An anticounterfeiting strategy using numeric tokens
-
Johnston, R.G. (2005) 'An anticounterfeiting strategy using numeric tokens', International Journal of Pharmaceutical Medicine, Vol.19, No.3, pp.163-171.
-
(2005)
International Journal of Pharmaceutical Medicine
, vol.19
, Issue.3
, pp. 163-171
-
-
Johnston, R.G.1
-
9
-
-
33749028998
-
Strengthening EPC tags against cloning
-
Cologne, Germany
-
Juels, A. (2005) 'Strengthening EPC tags against cloning', Proc. 4th ACM Workshop on Wireless Security, Cologne, Germany, pp.67-76.
-
(2005)
Proc. 4th ACM Workshop on Wireless Security
, pp. 67-76
-
-
Juels, A.1
-
10
-
-
33144457479
-
RFID security and privacy: A research survey
-
February
-
Juels, A. (2006) 'RFID security and privacy: a research survey', IEEE Journal on Selected Areas in Communications, Vol.24, No.2, February, pp.381-394.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
12
-
-
50049117520
-
RFID security protocol by lightweight ECC algorithm
-
ALPIT 2007, 22-24 August
-
Kim, S.J., Kim, Y.S. and Park, S.C. (2007) 'RFID security protocol by lightweight ECC algorithm', Proc. 6th International Conference on Advanced Language Processing and Web Information Technology, ALPIT 2007, 22-24 August, pp.323-328.
-
(2007)
Proc. 6th International Conference on Advanced Language Processing and Web Information Technology
, pp. 323-328
-
-
Kim, S.J.1
Kim, Y.S.2
Park, S.C.3
-
13
-
-
5444256863
-
-
Auto-ID Center, Massachusetts Institute of Technology, accessed 5 Nov 2009)
-
Koh, R., Schuster, E., Chackrabarti, I. and Bellman, A. (2003) White Paper: 'Securing the Pharmaceutical Supply Chain, Auto-ID Center, Massachusetts Institute of Technology, http://www.autoidlabs.org/uploads/media/MITAUTOID- WH021.pdf (accessed 5 Nov 2009).
-
(2003)
White Paper: 'Securing the Pharmaceutical Supply Chain
-
-
Koh, R.1
Schuster, E.2
Chackrabarti, I.3
Bellman, A.4
-
15
-
-
74549177898
-
-
Auto-ID Labs White Paper WP-SWNET-020, Auto-ID Labs ETH Zurich
-
Lehtonen, M., Michahelles, F. and Fleisch, E. (2007) Probabilistic Approach for Location-Based Authentication, Auto-ID Labs White Paper WP-SWNET-020, Auto-ID Labs ETH Zurich.
-
(2007)
Probabilistic Approach for Location-Based Authentication
-
-
Lehtonen, M.1
Michahelles, F.2
Fleisch, E.3
-
16
-
-
85008045069
-
Trust and security in RFID-based product authentication systems
-
Lehtonen, M., Michahelles, F. and Fleisch, E. (2008a) 'Trust and security in RFID-based product authentication systems', IEEE Systems Journal, Vol.1, No.2, pp.129-144.
-
(2008)
IEEE Systems Journal
, vol.1
, Issue.2
, pp. 129-144
-
-
Lehtonen, M.1
Michahelles, F.2
Fleisch, E.3
-
17
-
-
77949746746
-
Securing RFID systems by detecting tag cloning
-
Pervasive'09, Japan, May
-
Lehtonen, M., Ostojic, D., Ilic, A. and Michahelles, F. (2008) 'Securing RFID systems by detecting tag cloning', The Seventh International Conference on Pervasive Computing, Pervasive'09, Japan, May.
-
(2008)
The Seventh International Conference on Pervasive Computing
-
-
Lehtonen, M.1
Ostojic, D.2
Ilic, A.3
Michahelles, F.4
-
18
-
-
62349106096
-
Deckard: A system to detect change of RFID tag ownership
-
July
-
Mirowski, L. and Hartnett, J. (2007) 'Deckard: a system to detect change of RFID tag ownership', IJCSNS International, Journal of Computer Science and Network Security, Vol.7, No.7, July, pp.89-98.
-
(2007)
IJCSNS International, Journal of Computer Science and Network Security
, vol.7
, Issue.7
, pp. 89-98
-
-
Mirowski, L.1
Hartnett, J.2
-
19
-
-
62349115019
-
Privacy for RFID systems to prevent tracking and cloning
-
January
-
Mitra, M. (2008) 'Privacy for RFID systems to prevent tracking and cloning', IJCSNS International Journal of Computer Science and Network Security, Vol.8, No.1, January, pp.1-5. Mo, P.T., Sheng, Q.Z., Li, X. and Zeadally, S. (2009)
-
(2008)
IJCSNS International Journal of Computer Science and Network Security
, vol.8
, Issue.1
, pp. 1-5
-
-
Mitra, M.1
-
20
-
-
60549098472
-
RFID infrastructure design: A case study of two Australian RFID projects
-
January-February
-
Mo, P.T., Sheng, Q.Z., Li, X. and Zeadally, S. (2009) 'RFID infrastructure design: a case study of two Australian RFID projects', IEEE Internet Computing, Vol. 13, No. 1, January-February, pp.14-21.
-
(2009)
IEEE Internet Computing
, vol.13
, Issue.1
, pp. 14-21
-
-
Mo, P.T.1
Sheng, Q.Z.2
Li, X.3
Zeadally, S.4
-
21
-
-
51349094869
-
Recovering and restoring tampered RFID data using steganographic principles
-
Mohan, M., Potdar, V. and Chang, E. (2006) 'Recovering and restoring tampered RFID data using steganographic principles', Industrial Technology, (ICIT 2006), IEEE International Conference on 2006, pp.2853-2859.
-
(2006)
Industrial Technology, (ICIT 2006), IEEE International Conference on 2006
, pp. 2853-2859
-
-
Mohan, M.1
Potdar, V.2
Chang, E.3
-
22
-
-
33749079612
-
Product specific security features based on RFID technology
-
December
-
Nochta, Z., Staake, T. and Fleisch, E. (2006) 'Product specific security features based on RFID technology', International Symposium on Applications and the Internet Workshops (SAINTW'06), December, pp.72-75.
-
(2006)
International Symposium on Applications and the Internet Workshops (SAINTW'06)
, pp. 72-75
-
-
Nochta, Z.1
Staake, T.2
Fleisch, E.3
-
23
-
-
77949678014
-
-
24th Chaos Communication Congress, December, rfsti accessed 5 Nov 2009
-
Nohl, K. (2007) MIFARE - Little Security, Despite Obscurity, Technical Report, 24th Chaos Communication Congress, December, http://snurl.com/wiprNP (accessed 5 Nov 2009)
-
(2007)
MIFARE - Little Security, Despite Obscurity, Technical Report
-
-
Nohl, K.1
-
24
-
-
84893081352
-
Reverse-engineering a cryptographic RFID tag
-
USENIX Association, July, San Jose, CA
-
Nohl, K., Evans, D. and Plotz, H. (2008) 'Reverse-engineering a cryptographic RFID tag', Proc. USENIX Security Symposium, USENIX Association, July, San Jose, CA, pp.185-194.
-
(2008)
Proc USENIX Security Symposium
, pp. 185-194
-
-
Nohl, K.1
Evans, D.2
Plotz, H.3
-
25
-
-
51349133334
-
Tamper detection in RFID tags using fragile watermarking
-
15-17 December, Mumbai, India
-
Potdar, V. and Chang, E. (2006) 'Tamper detection in RFID tags using fragile watermarking', Proceedings of the IEEE International Conference on Industrial Technology (ICIT06), 15-17 December, Mumbai, India, pp.2846-2852.
-
(2006)
Proceedings of the IEEE International Conference on Industrial Technology (ICIT06)
, pp. 2846-2852
-
-
Potdar, V.1
Chang, E.2
-
26
-
-
24944461245
-
Trust management survey
-
Herrmann, P., Issarny, V. and Shiu, S. (Eds.), iTrust 2005, Springer-Verlag
-
Ruohomaa, S. and Kutvonen, L. (2005) 'Trust management survey', in Herrmann, P., Issarny, V. and Shiu, S. (Eds.): iTrust 2005, LNCS 3477, Springer-Verlag, pp.77-92.
-
(2005)
LNCS 3477
, pp. 77-92
-
-
Ruohomaa, S.1
Kutvonen, L.2
-
27
-
-
52449127948
-
Enabling next-generation RFID applications: Solutions and challenges
-
Sheng, Q.Z., Li, X. and Zeadally, S. (2008) 'Enabling next-generation RFID applications: solutions and challenges', Computer (IEEE), Vol.41, No.9, pp.22-29.
-
(2008)
Computer (IEEE)
, vol.41
, Issue.9
, pp. 22-29
-
-
Sheng, Q.Z.1
Li, X.2
Zeadally, S.3
-
28
-
-
33644541758
-
Extending the EPC network: The potential of RFID in anti-counterfeiting
-
Santa Fe, New Mexico
-
Staake, T., Thiesse, F. and Fleisch, E. (2005) 'Extending the EPC network: the potential of RFID in anti-counterfeiting', Proc. ACM Symposium on Applied Computing, Santa Fe, New Mexico, pp.1607-1612.
-
(2005)
Proc ACM Symposium on Applied Computing
, pp. 1607-1612
-
-
Staake, T.1
Thiesse, F.2
Fleisch, E.3
-
29
-
-
33750845011
-
A trust framework for pervasive computing environments
-
8 March
-
Wolfe, S.T. and Ahamed, S.I. (2006) 'A trust framework for pervasive computing environments', IEEE, Computer Systems and Applications, 8 March, pp.312-319.
-
(2006)
IEEE, Computer Systems and Applications
, pp. 312-319
-
-
Wolfe, S.T.1
Ahamed, S.I.2
-
31
-
-
48049120379
-
RFID authentication protocol using synchronized secret information
-
Yoon, S.J., Yoon, C.H., Ning, S., Ki, S.K. and Sang, H.L. (2007) 'RFID authentication protocol using synchronized secret information', The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007), pp.459-461
-
(2007)
The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007)
, pp. 459-461
-
-
Yoon, S.J.1
Yoon, C.H.2
Ning, S.3
Ki, S.K.4
Sang, H.L.5
|