-
1
-
-
30344469114
-
Authenticating Pervasive Devices with Human Protocols
-
A. Juels, S. A. Weis, "Authenticating Pervasive Devices with Human Protocols", in CRYPTO, 2005.
-
(2005)
CRYPTO
-
-
Juels, A.1
Weis, S.A.2
-
2
-
-
34548830043
-
A Case Against Currently Used Hash Functions in RFID Protocols
-
Feldhofer, Martin, and Recberger, "A Case Against Currently Used Hash Functions in RFID Protocols", in RFIDSec, 2006.
-
(2006)
RFIDSec
-
-
Feldhofer1
Martin2
Recberger3
-
3
-
-
36248971663
-
LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags
-
Peris-Lopez, Hernandez-Castro,Estevez Tapiador, and Ribagorda, "LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags", in RFIDSec, 2006.
-
(2006)
RFIDSec
-
-
Peris-Lopez1
Hernandez-Castro2
Tapiador, E.3
Ribagorda4
-
4
-
-
79959960333
-
RFID Tag-Reader Mutual Authentication Scheme Utilizing Tag Access Password
-
Konidala and Kim, "RFID Tag-Reader Mutual Authentication Scheme Utilizing Tag Access Password", in Auto-ID Labs White Paper WP-HARDWARE-033, 2007.
-
(2007)
Auto-ID Labs White Paper WP-HARDWARE-033
-
-
Konidala1
Kim2
-
5
-
-
70349284581
-
Secure Human Identification Protocols
-
ASIACRYPT
-
N. J. Hopper and M. Blum,, "Secure Human Identification Protocols", in ASIACRYPT, LNCS 2248, pp. 52-66, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.2
-
6
-
-
34547635774
-
Serverless Search and Authentication Protocols for RFID
-
C. Tan, B. Sheng, and Q. Li, "Serverless Search and Authentication Protocols for RFID", in Percom 2007.
-
Percom 2007
-
-
Tan, C.1
Sheng, B.2
Li, Q.3
-
7
-
-
34547623904
-
Physically Unclonable Function-Based Security and Privacy in RFID Systems
-
L. Bolotnyy and G. Robins, "Physically Unclonable Function-Based Security and Privacy in RFID Systems", in PerCom 2007.
-
PerCom 2007
-
-
Bolotnyy, L.1
Robins, G.2
-
8
-
-
34547307341
-
Physical Unclonable Functions for Device Authentication and Secret Key Generation
-
G. E. Suh, S. Devadas, "Physical Unclonable Functions for Device Authentication and Secret Key Generation", in DAC, 2007.
-
(2007)
DAC
-
-
Suh, G.E.1
Devadas, S.2
-
9
-
-
38349066494
-
An Efficient and Secure RFID Security Method with Ownership Transfer
-
CIS
-
K. Osaka, T. Takagi, K. Yamazaki and O. Takahashi, "An Efficient and Secure RFID Security Method with Ownership Transfer", in CIS, LNCS 4456, pp. 778-787, 2007.
-
(2007)
LNCS
, vol.4456
, pp. 778-787
-
-
Osaka, K.1
Takagi, T.2
Yamazaki, K.3
Takahashi, O.4
-
10
-
-
35048876270
-
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
-
Security in Pervasive Computing
-
S. A. Weis, S. E. Sarma, R. L. Rivest, D. W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", in Security in Pervasive Computing, LNCS 2802, pp. 201-212, 2003.
-
(2003)
LNCS
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
11
-
-
77953311868
-
A family of dunces: Trivial RFID identification and authentication protocols
-
G. Tsudik. "A family of dunces: Trivial RFID identification and authentication protocols", in PET 2007.
-
PET 2007
-
-
Tsudik, G.1
-
12
-
-
50049108255
-
Provably secure ubiquitous systems: Universally composable RFID authentication protocols
-
M. Burmester, T. v. Le, and B. d. Medeiros, "Provably secure ubiquitous systems: Universally composable RFID authentication protocols", in SecureComm, 2006.
-
(2006)
SecureComm
-
-
Burmester, M.1
Le, T.V.2
Medeiros, B.D.3
-
13
-
-
34547672707
-
RIPP-FS: An RFID Identification, Privacy Preserving protocol with Forward Secrecy
-
M. Conti, R. Di Pietro, L. Vincenzo Mancini, "RIPP-FS: an RFID Identification, Privacy Preserving protocol with Forward Secrecy", in PerCom, 2007.
-
(2007)
PerCom
-
-
Conti, M.1
Di Pietro, R.2
Vincenzo Mancini, L.3
-
14
-
-
36249031858
-
HB and Related Lightweight Authentication Protocols for Secure RFID Tag/Reader Authentication Title
-
S. Piramuthu, "HB and Related Lightweight Authentication Protocols for Secure RFID Tag/Reader Authentication Title", in CollECTeR Europe Conference, 2006.
-
CollECTeR Europe Conference, 2006
-
-
Piramuthu, S.1
-
15
-
-
51349133676
-
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol
-
G. Hammouri and B. Sunar, "PUF-HB: A Tamper-Resilient HB Based Authentication Protocol", in ACNS, 2008.
-
(2008)
ACNS
-
-
Hammouri, G.1
Sunar, B.2
-
16
-
-
57849147967
-
Security analysis of two ultra-lightweight RFID authentication protocols
-
T. Li and G. Wang, "Security analysis of two ultra-lightweight RFID authentication protocols", in IFIP SEC, 2007.
-
(2007)
IFIP SEC
-
-
Li, T.1
Wang, G.2
-
17
-
-
77953315116
-
Breaking EMAP
-
M. Bárász, B. Boros, P. Ligeti, K. Lója, and D. A. Nagy, "Breaking EMAP", in SecureComm, 2007.
-
(2007)
SecureComm
-
-
Bárász, M.1
Boros, B.2
Ligeti, P.3
Lója, K.4
Nagy, D.A.5
-
18
-
-
62349124225
-
A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme
-
D.M. Konidala, Z. Kim, and K. Kim, "A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme", in RFIDSec 2007.
-
RFIDSec 2007
-
-
Konidala, D.M.1
Kim, Z.2
Kim, K.3
-
19
-
-
39349089777
-
Addressing the Weakness in a Lightweight RFID Tag-Reader Mutual Authentication Scheme
-
T.L. Lim, and T. Li, "Addressing the Weakness in a Lightweight RFID Tag-Reader Mutual Authentication Scheme", in GLOBECOM 2007.
-
GLOBECOM 2007
-
-
Lim, T.L.1
Li, T.2
-
20
-
-
63149124281
-
Vulnerability Analysis of a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. Estevez-Tapiador, T. Li, and L. Tong Lee, "Vulnerability Analysis of a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard", in RFIDSec, 2008.
-
(2008)
RFIDSec
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.3
Li, T.4
Tong Lee, L.5
-
22
-
-
35248846439
-
POP Method: An Approach to Enhance the Security and privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism
-
K. Koralalage, S. Reza, J. Miura, Y. Goto and J. Cheng, "POP Method: An Approach to Enhance the Security and privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism", in Proc. ACM Symp. Applied Computing, 2007.
-
Proc. ACM Symp. Applied Computing, 2007
-
-
Koralalage, K.1
Reza, S.2
Miura, J.3
Goto, Y.4
Cheng, J.5
-
23
-
-
63149151663
-
A Simple Delegation Scheme for RFID Systems (SiDeS)
-
S. Fouladgar and H. Afifi, "A Simple Delegation Scheme for RFID Systems (SiDeS)", in RFID, 2007.
-
(2007)
RFID
-
-
Fouladgar, S.1
Afifi, H.2
-
24
-
-
33744928896
-
Reassignment Scheme of an RFID Tag Key for Owner Transfer
-
IFIP EUC
-
J. Saito, K. Imamoto, and K. Sakurai, "Reassignment Scheme of an RFID Tag Key for Owner Transfer", in IFIP EUC, LNCS 3823, pp. 1303-1312, 2005.
-
(2005)
LNCS
, vol.3823
, pp. 1303-1312
-
-
Saito, J.1
Imamoto, K.2
Sakurai, K.3
-
25
-
-
59249086568
-
A Lightweight Protocol Enabling Ownership Transfer and Granular Data Access of RFID Tags
-
Y. Seo, T. Asano, H. Lee and K. Kim, "A Lightweight Protocol Enabling Ownership Transfer and Granular Data Access of RFID Tags", in SCIS 2007.
-
SCIS 2007
-
-
Seo, Y.1
Asano, T.2
Lee, H.3
Kim, K.4
-
26
-
-
78149486773
-
RFID Tag Ownership Transfer
-
B. Song, "RFID Tag Ownership Transfer", in RFIDSec, 2008.
-
(2008)
RFIDSec
-
-
Song, B.1
|