-
2
-
-
33747304628
-
Is your cat infected with a computer virus?
-
Pisa, Italy
-
M. Rieback, B. Crispo, and A. Tanenbaum, "Is your cat infected with a computer virus?" in Proc. 4th Annu. IEEE Int. Conf. Pervasive Comput. Commun., Pisa, Italy, 2006, pp. 179-189.
-
(2006)
Proc. 4th Annu. IEEE Int. Conf. Pervasive Comput. Commun.
, pp. 179-189
-
-
Rieback, M.1
Crispo, B.2
Tanenbaum, A.3
-
3
-
-
20844459862
-
RFID privacy: An overview of problems and proposed solutions
-
May/Jun.
-
S. Garfinkel, A. Juels, and R. Pappu, "RFID privacy: An overview of problems and proposed solutions," IEEE Security Privacy, vol.3, no.3, p. 34-43, May/Jun. 2005.
-
(2005)
IEEE Security Privacy
, vol.3
, Issue.3
, pp. 34-43
-
-
Garfinkel, S.1
Juels, A.2
Pappu, R.3
-
4
-
-
33749379761
-
Mutual authentication protocol for low-cost RFID
-
presented at, Graz, Austria, Jul. 14-15
-
J. Yang, J. Park, H. Lee, K. Ren, and K. Kim, "Mutual authentication protocol for low-cost RFID," presented at the Handout Ecrypt Workshop RFID Lightweight Crypto, Graz, Austria, Jul. 14-15, 2005.
-
(2005)
The Handout Ecrypt Workshop RFID Lightweight Crypto
-
-
Yang, J.1
Park, J.2
Lee, H.3
Ren, K.4
Kim, K.5
-
5
-
-
0003449736
-
Survivable network systems: An emerging discipline
-
Software Engineering Institute, Carnegie Mellon University
-
R. Ellison, D. Fisher, R. Linger, H. Lipson, T. Longstaff, and N. Mead, "Survivable network systems: An emerging discipline," Software Engineering Institute, Carnegie Mellon University, Tech. Rep. CMU/SEI-97- TR-013, 1997.
-
(1997)
Tech. Rep. CMU/SEI-97- TR-013
-
-
Ellison, R.1
Fisher, D.2
Linger, R.3
Lipson, H.4
Longstaff, T.5
Mead, N.6
-
6
-
-
84942246436
-
Towards a rigorous definition of information system survivability
-
presented at, Washington, DC
-
J. Knight, E. Strunk, and K. Sullivan, "Towards a rigorous definition of information system survivability," presented at the DARPA Inf. Survivability Conf. Expo., Washington, DC, 2003.
-
(2003)
The DARPA Inf. Survivability Conf. Expo.
-
-
Knight, J.1
Strunk, E.2
Sullivan, K.3
-
7
-
-
84961725667
-
Survivability through customization and adaptability: The cactus approach
-
M. Hiltunen, R. Schlichting, C. Ugarte, and G. Wong, "Survivability through customization and adaptability: The cactus approach," in Proc. DARPA Inf. Survivability Conf. Expo., 2000, pp. 294-307.
-
(2000)
Proc. DARPA Inf. Survivability Conf. Expo.
, pp. 294-307
-
-
Hiltunen, M.1
Schlichting, R.2
Ugarte, C.3
Wong, G.4
-
9
-
-
0032679419
-
Information survivability for evolvable and adaptable real-time command and control systems
-
Jan.
-
B. Thuraisingham and J. Maurer, "Information survivability for evolvable and adaptable real-time command and control systems," IEEE Trans. Knowl. Data Eng., vol.11, no.1, pp. 228-238, Jan. 1999.
-
(1999)
IEEE Trans. Knowl. Data Eng.
, vol.11
, Issue.1
, pp. 228-238
-
-
Thuraisingham, B.1
Maurer, J.2
-
10
-
-
33748108997
-
Dependability through assured reconfiguration in embedded systems software
-
Jul.
-
E. Strunk and J.Knight, "Dependability through assured reconfiguration in embedded systems software," IEEE Trans. Dependable Secure Comput., vol.3, no.3, pp. 172-187, Jul. 2006.
-
(2006)
IEEE Trans. Dependable Secure Comput.
, vol.3
, Issue.3
, pp. 172-187
-
-
Strunk, E.1
Knight, J.2
-
11
-
-
0034228685
-
Reliability and survivability of wireless and mobile networks
-
Jul.
-
A. Snow, U. Varshney, and A. Malloy, "Reliability and survivability of wireless and mobile networks," IEEE Comput., vol.33, no.7, pp. 49-55, Jul. 2000.
-
(2000)
IEEE Comput.
, vol.33
, Issue.7
, pp. 49-55
-
-
Snow, A.1
Varshney, U.2
Malloy, A.3
-
12
-
-
77951735223
-
Research on the survivability of embedded real-time system
-
Y. Jin, "Research on the survivability of embedded real-time system," Int. J. Intell. Syst. Technol., vol.3, no.4, pp. 208-214, 2008.
-
(2008)
Int. J. Intell. Syst. Technol.
, vol.3
, Issue.4
, pp. 208-214
-
-
Jin, Y.1
-
13
-
-
33847577357
-
Survivability-over-security: Providing whole system assurance
-
Las Alamitos, CA
-
W. Yurcik, D. Doss, and H. Kruse, "Survivability-over-security: Providing whole system assurance," in Proc. IEEE/SEI/CERT Inf. Survivability Workshop, Las Alamitos, CA, 2000, pp. 201-204.
-
(2000)
Proc. IEEE/SEI/CERT Inf. Survivability Workshop
, pp. 201-204
-
-
Yurcik, W.1
Doss, D.2
Kruse, H.3
-
14
-
-
84962298362
-
Open implementation toolkit for building survivable applications
-
Hilton Head, SC
-
P. Pal, J. Loyall, R. Schantz, J. Zinky, and F. Webber, "Open implementation toolkit for building survivable applications," in Proc. DARPA Inf. Survivability Conf. Expo., Hilton Head, SC, 2000, pp. 197-200.
-
(2000)
Proc. DARPA Inf. Survivability Conf. Expo.
, pp. 197-200
-
-
Pal, P.1
Loyall, J.2
Schantz, R.3
Zinky, J.4
Webber, F.5
-
15
-
-
50149108262
-
-
Special Publication 800-898, Gaithersburg, MD: National Institute of Standards and Technology, [Online]. Available
-
T. Karygiannis, B. Eydt, G. Barber, L. Bunn, and T. Phillips. (2007). Guidelines for Securing Radio Frequency Identification (RFID) Systems, Special Publication 800-898, Gaithersburg, MD: National Institute of Standards and Technology, [Online]. Available: http://csrc.nist.gov/ publications/nistpubs
-
(2007)
Guidelines for Securing Radio Frequency Identification (RFID) Systems
-
-
Karygiannis, T.1
Eydt, B.2
Barber, G.3
Bunn, L.4
Phillips, T.5
-
16
-
-
33744957484
-
Adversarial model for radio frequency identification
-
[Online]. Available
-
G. Avoine. (2005). Adversarial model for radio frequency identification, Tech. Rep. 2005/049. [Online]. Available: http://eprint.iacr.org/2005/ 049.pdf
-
(2005)
Tech. Rep. 2005/049
-
-
Avoine, G.1
-
17
-
-
14844294769
-
Privacy and security in library RFID issues, practices, and architectures
-
presented at, Washington, DC
-
D. Molnar and D. Wagner, "Privacy and security in library RFID issues, practices, and architectures," presented at the ACM Conf. Comput. Commun. Security, Washington, DC, 2004.
-
(2004)
The ACM Conf. Comput. Commun. Security
-
-
Molnar, D.1
Wagner, D.2
-
18
-
-
54049143316
-
An elliptic curve processor suitable for RFID-tags
-
Aug. 22
-
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, "An elliptic curve processor suitable for RFID-tags," IEEE Trans. Comput., vol.57, no.11, pp. 1514-1527, Aug. 22, 2008.
-
(2008)
IEEE Trans. Comput.
, vol.57
, Issue.11
, pp. 1514-1527
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
19
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
Cryptographic Hardware and Embedded Systems, New York: Springer-Verlag
-
M. Feldhofer, S. Dominikus, and J.Wolkerstorfer, "Strong authentication for RFID systems using the AES algorithm," in Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science, vol. 3156). New York: Springer-Verlag, 2004, pp. 357-370.
-
(2004)
Lecture Notes in Computer Science
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
20
-
-
34548830043
-
A case against currently used hash functions in RFID protocols
-
presented at, Montpellier, France
-
M. Feldhofer and C. Rechberger, "A case against currently used hash functions in RFID protocols," presented at the 1st Int. Workshop Inf. Security, Montpellier, France, 2006.
-
(2006)
The 1st Int. Workshop Inf. Security
-
-
Feldhofer, M.1
Rechberger, C.2
-
21
-
-
67650132302
-
Low-cost SHA-1 hash function architecture for RFID tags
-
presented at, Budapest, Hungary
-
M. O'Neil, "Low-cost SHA-1 hash function architecture for RFID tags," presented at the Workshop RFID Security, Budapest, Hungary, 2008.
-
(2008)
The Workshop RFID Security
-
-
O'Neil, M.1
-
22
-
-
77953709509
-
Hardware implementation of a TEAbased lightweight encryption for RFID security
-
New York: Springer-Verlag
-
P. Israsena and S. Wongnamkum, "Hardware implementation of a TEAbased lightweight encryption for RFID security," in RFID Security. New York: Springer-Verlag, 2009, pp. 417-433.
-
(2009)
RFID Security
, pp. 417-433
-
-
Israsena, P.1
Wongnamkum, S.2
-
23
-
-
34547677214
-
Scaling ECC hardware to a minimum
-
presented at, Leuven, Belgium, Sep. 6-7
-
J.Wolkerstorfer, "Scaling ECC hardware to a minimum," presented at the Workshop Cryptographic Adv. Secure Hardware, Leuven, Belgium, Sep. 6-7, 2005.
-
(2005)
The Workshop Cryptographic Adv. Secure Hardware
-
-
Wolkerstorfer, J.1
-
24
-
-
33745654539
-
RFID-tags for anti-counterfeiting
-
presented at the Topics Cryptography-CT-RSA 2006, San Jose, CA, Feb. 13-17
-
P. Tuyls and L. Batina, "RFID-tags for anti-counterfeiting," presented at the Topics Cryptography-CT-RSA 2006, Lecture Notes Comput. Sci., San Jose, CA, Feb. 13-17, 2006.
-
(2006)
Lecture Notes Comput. Sci.
-
-
Tuyls, P.1
Batina, L.2
-
25
-
-
84969228768
-
Application of passive asymmetric RFID tags in a high-assurance avionics multi-domain RFID processing system
-
presented at, Freiburg, Germany, Jun.
-
R. Falk, F. Kohlmayer, A. Kopf, M. Braun, H. Seuschek, and M. Li, "Application of passive asymmetric RFID tags in a high-assurance avionics multi-domain RFID processing system," presented at the 4th Eur. Workshop RFID Syst. Technol., Freiburg, Germany, Jun. 2008.
-
(2008)
The 4th Eur. Workshop RFID Syst. Technol.
-
-
Falk, R.1
Kohlmayer, F.2
Kopf, A.3
Braun, M.4
Seuschek, H.5
Li, M.6
-
26
-
-
77953692717
-
A flyweight RFID authentication protocol
-
presented at, Leuven, Belgium, Jun. 30-Jul. 2
-
M. Burmester and J.Munilla, "A flyweight RFID authentication protocol," presented at theWorkshop RFID Security, Leuven, Belgium, Jun. 30-Jul. 2, 2009.
-
(2009)
The Workshop RFID Security
-
-
Burmester, M.1
Munilla, J.2
-
27
-
-
77953694965
-
Scalable RFID authentication protocol
-
presented at, Gold Coast, Australia, Oct. 19-21
-
B. Song and C. Mitchell, "Scalable RFID authentication protocol," presented at the 3rd Int. Conf. Netw. Syst. Security, Gold Coast, Australia, Oct. 19-21, 2009.
-
(2009)
The 3rd Int. Conf. Netw. Syst. Security
-
-
Song, B.1
Mitchell, C.2
-
28
-
-
76749095501
-
RFID distance bounding protocol with mixed challenges to prevent replay attacks
-
presented at, Kanazawa, Ishikawa, Japan, Dec. 12-14
-
C. Kim and G. Avoine, "RFID distance bounding protocol with mixed challenges to prevent replay attacks," presented at the 8th Int. Conf. Cryptography Netw. Security, Kanazawa, Ishikawa, Japan, Dec. 12-14, 2009.
-
(2009)
The 8th Int. Conf. Cryptography Netw. Security
-
-
Kim, C.1
Avoine, G.2
-
29
-
-
79952915179
-
Using HB family of protocols for privacy-preserving authentication of RFID tags in a population
-
presented at, Leuven, Belgium
-
T. Halevi, N. Saxena, and S. Halevi, "Using HB family of protocols for privacy-preserving authentication of RFID tags in a population," presented at the Workshop RFID Security, Leuven, Belgium, 2009.
-
(2009)
The Workshop RFID Security
-
-
Halevi, T.1
Saxena, N.2
Halevi, S.3
-
30
-
-
36248982045
-
SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
-
Oct.-Dec.
-
H. Chien, "SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity," IEEE Trans. Dependable Secure Comput., vol.4, no.4, pp. 337-340, Oct.-Dec. 2007.
-
(2007)
IEEE Trans. Dependable Secure Comput.
, vol.4
, Issue.4
, pp. 337-340
-
-
Chien, H.1
-
31
-
-
70450265312
-
Cryptanalysis of a new ultralightweight RFID authentication protocol-SASI
-
Jun. 19
-
R. Phan, "Cryptanalysis of a new ultralightweight RFID authentication protocol-SASI," IEEE Trans. Dependable Secure Comput., vol.6, no.4, pp. 316-320, Jun. 19, 2008.
-
(2008)
IEEE Trans. Dependable Secure Comput.
, vol.6
, Issue.4
, pp. 316-320
-
-
Phan, R.1
-
32
-
-
77951273314
-
On the security of Chien's ultralightweight RFID authentication protocol
-
Jul. 22
-
H. Sun, W. Ting, and K. Wang, "On the security of Chien's ultralightweight RFID authentication protocol," IEEE Trans. Dependable Secure Comput., vol.99, no.1, p. 1, Jul. 22, 2009.
-
(2009)
IEEE Trans. Dependable Secure Comput.
, vol.99
, Issue.1
, pp. 1
-
-
Sun, H.1
Ting, W.2
Wang, K.3
-
33
-
-
60449095092
-
Security analysis of the SASI protocol
-
Jan.- Mar.
-
T. Cao, E. Bertino, and H. Lei, "Security analysis of the SASI protocol," IEEE Trans. Dependable Secure Comput., vol.6, no.2, pp. 73-77, Jan.- Mar. 2009.
-
(2009)
IEEE Trans. Dependable Secure Comput.
, vol.6
, Issue.2
, pp. 73-77
-
-
Cao, T.1
Bertino, E.2
Lei, H.3
-
35
-
-
70349155465
-
Attacks and improvements to an RFID mutual authentication protocol and its extensions
-
presented at, Zurich, Switzerland, Mar. 16-18
-
S. Cai and Y. Li, "Attacks and improvements to an RFID mutual authentication protocol and its extensions," presented at the 2nd ACM Conf. Wireless Netw. Security, Zurich, Switzerland, Mar. 16-18, 2009.
-
(2009)
The 2nd ACM Conf. Wireless Netw. Security
-
-
Cai, S.1
Li, Y.2
-
36
-
-
84865529995
-
Weaknesses in two recent lightweight RFID authentication protocols
-
presented at, Leuven, Belgium, Jun. 30-Jul. 2
-
P. Peris-Lopez, J. Hernandez-Castro, J. Estevez-Tapiador, T. Li, and J. Van Der Lubbe, "Weaknesses in two recent lightweight RFID authentication protocols," presented at the Workshop RFID Security, Leuven, Belgium, Jun. 30-Jul. 2, 2009.
-
(2009)
The Workshop RFID Security
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.2
Estevez-Tapiador, J.3
Li, T.4
Lubbe Der J.Van5
-
37
-
-
77953691878
-
-
PUF Based RFIDs. [Online]. Available
-
PUF Based RFIDs. (2010). [Online]. Available: www.verayo.com/ product/pufrfid.html
-
(2010)
-
-
-
38
-
-
45749153036
-
PUF-HB: A tamper-resilient HB based authentication protocol
-
New York
-
G. Hammouri and B. Sunar, "PUF-HB: A tamper-resilient HB based authentication protocol," in Proc. Appl. Cryptography Netw. Security, New York, 2008, pp. 346-365.
-
(2008)
Proc. Appl. Cryptography Netw. Security
, pp. 346-365
-
-
Hammouri, G.1
Sunar, B.2
-
39
-
-
77953716003
-
Authentication pervasive devices with human protocols
-
presented at, Santa Barbara, CA, Aug. 14-18
-
A. Jules and S. Weis, "Authentication pervasive devices with human protocols," presented at the 25th Int. Cryptol. Conf., Santa Barbara, CA, Aug. 14-18.
-
The 25th Int. Cryptol. Conf.
-
-
Jules, A.1
Weis, S.2
-
40
-
-
52449089460
-
Improved privacy of the tree-based hash protocols using physically unclonable function
-
Amalfi, Italy, Sep. 10-12
-
J. Bringer, H. Chabanne, and T. Icart, "Improved privacy of the tree-based hash protocols using physically unclonable function," in Proc. 6th Conf. Security Cryptography Netw., Amalfi, Italy, Sep. 10-12, 2008, pp. 77-91.
-
(2008)
Proc. 6th Conf. Security Cryptography Netw.
, pp. 77-91
-
-
Bringer, J.1
Chabanne, H.2
Icart, T.3
-
41
-
-
34548285839
-
Remote password extraction from RFID tags
-
Sep.
-
Y. Oren and A. Shamir, "Remote password extraction from RFID tags," IEEE Trans. Comput., vol.56, no.9, pp. 1292-1296, Sep. 2007.
-
(2007)
IEEE Trans. Comput.
, vol.56
, Issue.9
, pp. 1292-1296
-
-
Oren, Y.1
Shamir, A.2
-
42
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Cambridge, U.K.
-
F. Stajano and R. Anderson, "The resurrecting duckling: Security issues for ad-hoc wireless networks," in Proc. 7th Int. Workshop Security Protocols, Cambridge, U.K., 1999, pp. 172-194.
-
(1999)
Proc. 7th Int. Workshop Security Protocols
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
43
-
-
29344433081
-
Scanning with a purpose-Supporting the fair information principles in RFID protocols
-
presented at, Tokyo, Japan, Nov. 8-9
-
C. Floerkemeier, R. Schneider, and M. Langheinrich, "Scanning with a purpose-Supporting the fair information principles in RFID protocols," presented at the 2nd Int. Symp. Ubiquitous Comput. Syst., Tokyo, Japan, Nov. 8-9, 2004.
-
(2004)
The 2nd Int. Symp. Ubiquitous Comput. Syst.
-
-
Floerkemeier, C.1
Schneider, R.2
Langheinrich, M.3
-
44
-
-
18744409344
-
The blocker tag: Selective blocking of RFID tags for consumer privacy
-
Washington, DC
-
A. Juels, R. Rivest, andM. Szydlo, "The blocker tag: selective blocking of RFID tags for consumer privacy," in Proc. ACM Conf. Comput. Commun. Security, Washington, DC, 2003, pp. 103-111.
-
(2003)
Proc. ACM Conf. Comput. Commun. Security
, pp. 103-111
-
-
Juels, A.1
Rivest, R.2
Szydlo, M.3
-
45
-
-
14844290165
-
Enhancing RFID privacy via antenna energy analysis
-
presented at, Boston, MA
-
K. Fishkin and S. Roy, "Enhancing RFID privacy via antenna energy analysis," presented at the MIT RFID Privacy Workshop, Boston, MA, 2003.
-
(2003)
The MIT RFID Privacy Workshop
-
-
Fishkin, K.1
Roy, S.2
-
46
-
-
58049137086
-
High-power proxies for enhancing RFID privacy and utility
-
presented at, Dubrovnik, Croatia
-
A. Juels, P. Syverson, and D. Bailey, "High-power proxies for enhancing RFID privacy and utility," presented at the Workshop Privacy Enhancing Technol. (PET), Dubrovnik, Croatia, 2005.
-
(2005)
The Workshop Privacy Enhancing Technol. (PET)
-
-
Juels, A.1
Syverson, P.2
Bailey, D.3
-
47
-
-
26444435642
-
RFID guardian: A batterypowered mobile device for RFID privacy management
-
Brisbane, Australia Jul.
-
M. Rieback, B. Crispo, and A. Tanenbaum, "RFID guardian: A batterypowered mobile device for RFID privacy management," in Proc. Australian Conf. Inf. Security Privacy, Brisbane, Australia, Jul. 2005, pp. 184- 194.
-
(2005)
Proc. Australian Conf. Inf. Security Privacy
, pp. 184-194
-
-
Rieback, M.1
Crispo, B.2
Tanenbaum, A.3
-
48
-
-
33745597876
-
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
-
D. Molnar, A. Soppera, and D. Wagner, "A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags," Lecture Notes Comput. Sci., vol.3897, pp. 276-290, 2006.
-
(2006)
Lecture Notes Comput. Sci.
, vol.3897
, pp. 276-290
-
-
Molnar, D.1
Soppera, A.2
Wagner, D.3
-
49
-
-
77953728527
-
Secure and private search protocols for RFID systems
-
[Online]. Available:
-
Y. Zuo, Secure and private search protocols for RFID systems. Inf. Syst. Front.: J. Res. Innov. [Online]. Available: http://www.springerlink.com/ content/b66r8r0465r89614/
-
Inf. Syst. Front.: J. Res. Innov.
-
-
Zuo, Y.1
-
50
-
-
77953701050
-
Data synchronization in privacy-preserving RFID authentication schemes
-
presented at, Budapest, Hungary Jul. 9-11
-
S. Canard and I. Coisel, "Data synchronization in privacy-preserving RFID authentication schemes," presented at theWorkshop RFID Security, Budapest, Hungary, Jul. 9-11, 2008.
-
(2008)
The Workshop RFID Security
-
-
Canard, S.1
Coisel, I.2
-
51
-
-
33847330246
-
A lightweight RFID protocol to protect against traceability and cloning attacks
-
presented at, Athens, Greece, Sep. 5-9
-
T. Dimitriou, "A lightweight RFID protocol to protect against traceability and cloning attacks," presented at the 1st Int. Conf. Security Privacy Emerg. Areas Commun. Netw., Athens, Greece, Sep. 5-9, 2005.
-
(2005)
The 1st Int. Conf. Security Privacy Emerg. Areas Commun. Netw.
-
-
Dimitriou, T.1
-
52
-
-
26444443915
-
A scalable and provably secure hash-based RFID protocol
-
presented at, Kauai Island, HI, Mar. 8
-
G. Avoine and P. Oechslin, "A scalable and provably secure hash-based RFID protocol," presented at the 2nd IEEE Int.Workshop Pervasive Comput. Commun. Security, Kauai Island, HI, Mar. 8, 2005.
-
(2005)
The 2nd IEEE Int.Workshop Pervasive Comput. Commun. Security
-
-
Avoine, G.1
Oechslin, P.2
-
53
-
-
36248977046
-
Security analysis of two ultra-lightweight RFID authentication protocols
-
Sandton, Gauteng, South Africa, May 14-16
-
T. Li and G. Wang, "Security analysis of two ultra-lightweight RFID authentication protocols," in Proc. IFIP Int. Inf. Secur. Conf., Sandton, Gauteng, South Africa, May 14-16, 2007.
-
(2007)
Proc. IFIP Int. Inf. Secur. Conf.
-
-
Li, T.1
Wang, G.2
-
54
-
-
33144457479
-
RFID security and privacy: A research survey
-
Feb.
-
A. Juels, "RFID security and privacy: A research survey," IEEE J. Sel. Areas Commun., vol.24, no.2, pp. 381-395, Feb. 2006.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.2
, pp. 381-395
-
-
Juels, A.1
-
55
-
-
0036983409
-
A distributed monitoring mechanism for wireless sensor networks
-
presented at, Atlanta, GA, Sep.
-
C. Hsin and M. Liu, "A distributed monitoring mechanism for wireless sensor networks," presented at the ACM Workshop Wireless Security, Atlanta, GA, Sep. 2002.
-
(2002)
The ACM Workshop Wireless Security
-
-
Hsin, C.1
Liu, M.2
-
56
-
-
3142684688
-
Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks
-
presented at, Monterey, CA, Oct. 13-16
-
S. Doumit andD.Agrawal, "Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks," presented at the Military Commun. Conf., Monterey, CA, Oct. 13-16, 2003.
-
(2003)
The Military Commun. Conf.
-
-
Doumit, S.1
Agrawal, D.2
-
57
-
-
77952380163
-
RFID survivability quantification and attack modeling
-
presented at, Hoboken, NJ, Mar. 22-24
-
Y. Zuo, "RFID survivability quantification and attack modeling," presented at the 3rd ACMConf.Wireless Netw. Security, Hoboken, NJ, Mar. 22-24, 2010.
-
The 3rd ACMConf. Wireless Netw. Security
, pp. 2010
-
-
Zuo, Y.1
-
58
-
-
38149056913
-
Strong and robust RFID authentication enabling perfect ownership transfer
-
presented at, Raleigh, NC, Dec. 4-7
-
C. Lim and T. Kwon, "Strong and robust RFID authentication enabling perfect ownership transfer," presented at the 8th Conf. Inf. Commun. Security, Raleigh, NC, Dec. 4-7, 2006.
-
(2006)
The 8th Conf. Inf. Commun. Security
-
-
Lim, C.1
Kwon, T.2
|