-
1
-
-
62949229889
-
-
Eds. CRC Press
-
AHSON, S. A., AND ILYAS, M., Eds. RFID Handbook: Applications, Technology, Security, and Privacy. CRC Press, 2008.
-
(2008)
RFID Handbook: Applications, Technology, Security, and Privacy
-
-
Ahson, S.A.1
Ilyas, M.2
-
3
-
-
84910156435
-
VTPM: Virtualizing the trusted platform module
-
USENIX Association
-
BERGER, S., CÁCERES, R., GOLDMAN, K. A., PEREZ, R., SAILER, R., AND VAN DOORN, L. vTPM: virtualizing the trusted platform module. In Proceedings of the 15th USENIX Security Symposium (2006), USENIX Association.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
4
-
-
84957068240
-
UMAC: Fast and secure message authentication
-
Springer-Verlag
-
BLACK, J., HALEVI, S., KRAWCZYK, H., KROVETZ, T., AND ROGAWAY, P. UMAC: Fast and secure message authentication. In CRYPTO (1999), Springer-Verlag, pp. 216–233.
-
(1999)
CRYPTO
, pp. 216-233
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
6
-
-
0020913618
-
On computationally secure authentication tags requiring short secret shared keys
-
BRASSARD, G. On computationally secure authentication tags requiring short secret shared keys. In CRYPTO (1982), pp. 79–86.
-
(1982)
CRYPTO
, pp. 79-86
-
-
Brassard, G.1
-
7
-
-
84873946697
-
Revisiting smart dust with RFID sensor networks
-
October
-
BUETTNER, M., GREENSTEIN, B., SAMPLE, A., SMITH, J. R., AND WETHERALL, D. Revisiting smart dust with RFID sensor networks. In Proceedings of the 7th ACM Workshop on Hot Topics in Networks (HotNets-VII) (October 2008).
-
(2008)
Proceedings of the 7th ACM Workshop on Hot Topics in Networks (HotNets-VII)
-
-
Buettner, M.1
Greenstein, B.2
Sample, A.3
Smith, J.R.4
Wetherall, D.5
-
9
-
-
50249176295
-
Maximalist cryptography and computation on the WISP UHF RFID tag
-
July
-
CHAE, H.-J., YEAGER, D. J., SMITH, J. R., AND FU, K. Maximalist cryptography and computation on the WISP UHF RFID tag. In Proceedings of the Conference on RFID Security (July 2007).
-
(2007)
Proceedings of the Conference on RFID Security
-
-
Chae, H.-J.1
Yeager, D.J.2
Smith, J.R.3
Fu, K.4
-
10
-
-
33748300805
-
Battery power-aware encryption
-
CHANDRAMOULI, R., BAPATLA, S., SUBBALAKSHMI, K. P., AND UMA, R. N. Battery power-aware encryption. ACM Trans. Inf. Syst. Secur. 9, 2 (2006), 162–180.
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, Issue.2
, pp. 162-180
-
-
Chandramouli, R.1
Bapatla, S.2
Subbalakshmi, K.P.3
Uma, R.N.4
-
11
-
-
77956617873
-
-
COOPER, D., DANG, H., LEE, P., MACGREGOR, W., AND MEHTA, K. Secure Biometric Match-on-Card Feasibility Report, 2007.
-
(2007)
Secure Biometric Match-on-Card Feasibility Report
-
-
Cooper, D.1
Dang, H.2
Lee, P.3
Macgregor, W.4
Mehta, K.5
-
12
-
-
51249105495
-
Rethinking data management for storage-centric sensor networks
-
January
-
DIAO, Y., GANESAN, D., MATHUR, G., AND SHENOY, P. Rethinking data management for storage-centric sensor networks. In Proceedings of the Third Biennial Conference on Innovative Data Systems Research (CIDR) (January 2007).
-
(2007)
Proceedings of the Third Biennial Conference on Innovative Data Systems Research (CIDR)
-
-
Diao, Y.1
Ganesan, D.2
Mathur, G.3
Shenoy, P.4
-
14
-
-
84942512232
-
Square hash: Fast message authentication via optimized universal hash functions
-
In Springer-Verlag
-
ETZEL, M., PATEL, S., AND RAMZAN, Z. Square hash: Fast message authentication via optimized universal hash functions. In In Proc. CRYPTO 99, Lecture Notes in Computer Science (1999), Springer-Verlag, pp. 234–251.
-
(1999)
Proc. CRYPTO 99, Lecture Notes in Computer Science
, pp. 234-251
-
-
Etzel, M.1
Patel, S.2
Ramzan, Z.3
-
15
-
-
85076915199
-
Quanto: Tracking energy in networked embedded systems
-
FONSECA, R., DUTTA, P., LEVIS, P., AND STOICA, I. Quanto: Tracking energy in networked embedded systems. In 8th USENIX Symposium of Operating Systems Design and Implementation (OSDI’08) (2008), pp. 323–328.
-
(2008)
8th USENIX Symposium of Operating Systems Design and Implementation (OSDI’08)
, pp. 323-328
-
-
Fonseca, R.1
Dutta, P.2
Levis, P.3
Stoica, I.4
-
16
-
-
0346739133
-
Fast and secure distributed read-only file system
-
February
-
FU, K., KAASHOEK, M. F., AND MAZIÈRES, D. Fast and secure distributed read-only file system. ACM Transactions on Computer Systems 20, 1 (February 2002), 1–24.
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.1
, pp. 1-24
-
-
Fu, K.1
Kaashoek, M.F.2
Mazières, D.3
-
17
-
-
33751027155
-
Analysis of the Linux random number generator
-
IEEE Computer Society
-
GUTTERMAN, Z., PINKAS, B., AND REINMAN, T. Analysis of the Linux random number generator. In IEEE Symposium on Security and Privacy (2006), IEEE Computer Society, pp. 371–385.
-
(2006)
IEEE Symposium on Security and Privacy
, pp. 371-385
-
-
Gutterman, Z.1
Pinkas, B.2
Reinman, T.3
-
18
-
-
0024627110
-
Degradations due to hole trapping in flash memory cells
-
March IEEE
-
HADDAD, S., CHANG, C., SWAMINATHAN, B., AND LIEN, J. Degradations due to hole trapping in flash memory cells. In Electron Device Letters (March 1989), IEEE, pp. 117–119.
-
(1989)
Electron Device Letters
, pp. 117-119
-
-
Haddad, S.1
Chang, C.2
Swaminathan, B.3
Lien, J.4
-
19
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
May IEEE Computer Society
-
HALPERIN, D., HEYDT-BENJAMIN, T. S., RANSFORD, B., CLARK, S. S., DEFEND, B., MORGAN, W., FU, K., KOHNO, T., AND MAISEL, W. H. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In IEEE Symposium on Security and Privacy (May 2008), IEEE Computer Society, pp. 129–142.
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Ransford, B.3
Clark, S.S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.H.9
-
20
-
-
85076265268
-
-
ca. B.C
-
HOMER. Odyssey, vol. XI. ca. 750 B.C.
-
Odyssey
, vol.11
, pp. 750
-
-
Homer1
-
21
-
-
33144457479
-
RFID security and privacy: A research survey
-
February
-
JUELS, A. RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications 24, 2 (February 2006), 381–394.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
22
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
San Francisco, CA, December
-
KALLAHALLA, M., RIEDEL, E., SWAMINATHAN, R., WANG, Q., AND FU, K. Plutus: Scalable secure file sharing on untrusted storage. In Proc. USENIX Conference on File and Storage Technologies (San Francisco, CA, December 2003).
-
(2003)
Proc. USENIX Conference on File and Storage Technologies
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
24
-
-
34547487841
-
Capsule: An energy-optimized object storage system for memory-constrained sensor devices
-
November
-
MATHUR, G., DESNOYERS, P., GANESAN, D., AND SHENOY, P. CAPSULE: An energy-optimized object storage system for memory-constrained sensor devices. In Proceedings of the Fourth ACM Conference on Embedded Networked Sensor Systems (SenSys) (November 2006).
-
(2006)
Proceedings of the Fourth ACM Conference on Embedded Networked Sensor Systems (SenSys)
-
-
Mathur, G.1
Desnoyers, P.2
Ganesan, D.3
Shenoy, P.4
-
25
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
Sept
-
PERRIG, A., SZEWCZYK, R., WEN, V., CULLER, D., AND TY-GAR, J. D. SPINS: Security protocols for sensor networks. Wireless Networks 8, 5 (Sept. 2002), 521–534.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Ty-Gar, J.D.5
-
26
-
-
78751694609
-
Getting things done on computational RFIDs with energy-aware checkpointing and voltage-aware scheduling
-
December
-
RANSFORD, B., CLARK, S., SALAJEGHEH, M., AND FU, K. Getting things done on computational RFIDs with energy-aware checkpointing and voltage-aware scheduling. In Proceedings of USENIX Workshop on Power Aware Computing and Systems (HotPower) (December 2008).
-
(2008)
Proceedings of USENIX Workshop on Power Aware Computing and Systems (HotPower)
-
-
Ransford, B.1
Clark, S.2
Salajegheh, M.3
Fu, K.4
-
29
-
-
54949090328
-
Design of an RFID-based battery-free programmable sensing platform
-
SAMPLE, A. P., YEAGER, D. J., POWLEDGE, P. S., MAMISHEV, A. V., AND SMITH, J. R. Design of an RFID-based battery-free programmable sensing platform. In IEEE Transactions on Instrumentation and Measurement (2008).
-
(2008)
IEEE Transactions on Instrumentation and Measurement
-
-
Sample, A.P.1
Yeager, D.J.2
Powledge, P.S.3
Mamishev, A.V.4
Smith, J.R.5
-
30
-
-
0003855464
-
-
John Wiley & Sons, Inc., New York, NY, USA
-
SCHNEIER, B. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C. John Wiley & Sons, Inc., New York, NY, USA, 1995.
-
(1995)
Applied Cryptography (2nd Ed.): Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
31
-
-
50249161524
-
SQUASH—a new MAC with provable security properties for highly constrained devices such as RFID tags
-
Springer-Verlag
-
SHAMIR, A. SQUASH—a new MAC with provable security properties for highly constrained devices such as RFID tags. In Proceedings of the 15th International Workshop on Fast Software Encryption (FSE) (2008), Springer-Verlag, pp. 144–157.
-
(2008)
Proceedings of the 15th International Workshop on Fast Software Encryption (FSE)
, pp. 144-157
-
-
Shamir, A.1
-
33
-
-
85076319036
-
-
Trusted computing group. http://www.trustedcomputinggroup.org.
-
-
-
-
34
-
-
49049103638
-
Wirelessly-charged UHF tags for sensor data collection
-
YEAGER, D., POWLEDGE, P., PRASAD, R., WETHERALL, D., AND SMITH, J. Wirelessly-Charged UHF Tags for Sensor Data Collection. In IEEE International Conference on RFID (2008), pp. 320–327.
-
(2008)
IEEE International Conference on RFID
, pp. 320-327
-
-
Yeager, D.1
Powledge, P.2
Prasad, R.3
Wetherall, D.4
Smith, J.5
|