-
1
-
-
34547517142
-
Just fast keying in the pi calculus
-
M. Abadi, B. Blanchet, and C. Fournet. Just fast keying in the pi calculus. ACM Trans. Inf. Syst. Secur., 10(3):9, 2007.
-
(2007)
ACM Trans. Inf. Syst. Secur.
, vol.10
, Issue.3
, pp. 9
-
-
Abadi, M.1
Blanchet, B.2
Fournet, C.3
-
2
-
-
0035035153
-
Mobile values, new names, and secure communication
-
M. Abadi and C. Fournet. Mobile values, new names, and secure communication. SIGPLAN Not., 36(3):104-115, 2001.
-
(2001)
SIGPLAN Not.
, vol.36
, Issue.3
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
4
-
-
33745621564
-
Reducing time complexity in RFID systems
-
B. Preneel and S. Tavares, editors, Kingston, Canada, August 2005
-
G. Avoine, E. Dysli, and P. Oechslin. Reducing time complexity in RFID systems. In B. Preneel and S. Tavares, editors, Selected Areas in Cryptography - SAC 2005, volume 3897 of Lecture Notes in Computer Science, pages 291-306, Kingston, Canada, August 2005.
-
Selected Areas in Cryptography - SAC 2005, Volume 3897 of Lecture Notes in Computer Science
, pp. 291-306
-
-
Avoine, G.1
Dysli, E.2
Oechslin, P.3
-
5
-
-
77950316222
-
-
Boycott benetton. http://www.boycottbenetton.com/.
-
-
-
-
6
-
-
0034822279
-
An e.cient cryptographic protocol verifier based on prolog rules
-
Washington, DC, USA, IEEE Computer Society.
-
B. Blanchet. An e.cient cryptographic protocol verifier based on prolog rules. In CSFW '01: Proceedings of the 14th IEEE workshop on Computer Security Foundations, page 82, Washington, DC, USA, 2001. IEEE Computer Society.
-
(2001)
CSFW '01: Proceedings of the 14th IEEE Workshop on Computer Security Foundations
, pp. 82
-
-
Blanchet, B.1
-
7
-
-
3543058869
-
Automatic Proof of Strong Secrecy for Security Protocols. in
-
Oakland, California, May
-
B. Blanchet. Automatic Proof of Strong Secrecy for Security Protocols. In IEEE Symposium on Security and Privacy, pages 86-100, Oakland, California, May 2004.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 86-100
-
-
Blanchet, B.1
-
8
-
-
77950329391
-
Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols. in
-
M. Burmester, T. v. Le, and B. d. Medeiros. Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols. In Conference on Security and Privacy for Emerging Areas in Communication Networks - SecureComm, Baltimore, Maryland, USA, August-September 2006. IEEE.
-
Conference on Security and Privacy for Emerging Areas in Communication Networks - SecureComm, Baltimore, Maryland, USA, August-September 2006. IEEE.
-
-
Burmester, M.1
Le, T.V.2
Medeiros, B.D.3
-
10
-
-
33646028830
-
A practical voter-verifiable election scheme
-
D. Chaum, P. Y. A. Ryan, and S. A. Schneider. A practical voter-verifiable election scheme. In ESORICS, pages 118-139, 2005.
-
(2005)
ESORICS
, pp. 118-139
-
-
Chaum, D.1
Ryan, P.Y.A.2
Schneider, S.A.3
-
13
-
-
57049128814
-
Dismantling mifare classic
-
F. D. Garcia, G. Koning Gans, R. Muijrers, P. Rossum, R. Verdult, R. W. Schreur, and B. Jacobs. Dismantling mifare classic. In ESORICS '08: Proceedings of the 13th European Symposium on Research in Computer Security, pages 97-114, 2008.
-
(2008)
ESORICS '08: Proceedings of the 13th European Symposium on Research in Computer Security
, pp. 97-114
-
-
Garcia, F.D.1
Koning Gans, G.2
Muijrers, R.3
Rossum, P.4
Verdult, R.5
Schreur, R.W.6
Jacobs, B.7
-
14
-
-
20844459862
-
RFID privacy: An overview of problems and proposed solutions
-
S. L. Garfinkel, A. Juels, and R. Pappu. RFID privacy: An overview of problems and proposed solutions. IEEE Security and Privacy, 3(3):34-43, 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 34-43
-
-
Garfinkel, S.L.1
Juels, A.2
Pappu, R.3
-
16
-
-
34547687590
-
Defining strong privacy for RFID
-
Washington, DC, USA, 2007. IEEE Computer Society.
-
A. Juels and S. A. Weis. Defining strong privacy for RFID. In PERCOMW '07: Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops, pages 342-347, Washington, DC, USA, 2007. IEEE Computer Society.
-
PERCOMW '07: Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
, pp. 342-347
-
-
Juels, A.1
Weis, S.A.2
-
17
-
-
67649083400
-
-
Technical report, University of Washington
-
S. Saponas, J. Lester, C. Hartung, and T. Kohno. Devices that tell on you: The Nike+iPod sport kit. Technical report, University of Washington, 2006.
-
(2006)
Devices That Tell on You: The Nike+iPod Sport Kit
-
-
Saponas, S.1
Lester, J.2
Hartung, C.3
Kohno, T.4
-
18
-
-
78049375173
-
Untraceability of RFID protocols
-
Springer
-
T. van Deursen, S. Mauw, and S. Radomirovi. Untraceability of RFID protocols. In Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, volume 5019. 5019 of Lecture Notes in Computer Science, page 115. Springer, 2008.
-
(2008)
Information Security Theory and Practices. Smart Devices, Convergence and next Generation Networks, Volume 5019. 5019 of Lecture Notes in Computer Science
, pp. 115
-
-
Van Deursen, T.1
Mauw, S.2
Radomirovi, S.3
-
20
-
-
21144438831
-
Security and privacy aspects of low-cost radio
-
Hutter, D., Müller, G., Stephan, W., Ullman, M., eds.: Springer-Verlag, march 2003.
-
S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels. Security and privacy aspects of low-cost radio. In Hutter, D., Müller, G., Stephan, W., Ullman, M., eds.: International Conference on Security in Pervasive Computing - SPC 2003, volume 2802 of LNCS, Boppard, Germany, pages 454-469. Springer-Verlag, march 2003.
-
International Conference on Security in Pervasive Computing - SPC 2003, Volume 2802 of LNCS, Boppard, Germany
, pp. 454-469
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
|