-
2
-
-
39749140948
-
Towards traceability across sovereign, distributed RFID databases
-
R. Agrawal, A. Cheung, K. Kailing, and S. Schönauer. Towards Traceability across Sovereign, Distributed RFID Databases. Proceedings of the 10th International Database Engineering and Applications Symposium, 2006.
-
(2006)
Proceedings of the 10th International Database Engineering and Applications Symposium
-
-
Agrawal, R.1
Cheung, A.2
Kailing, K.3
Schönauer, S.4
-
5
-
-
34547688845
-
Public-key cryptography for RFID-tags
-
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede. Public-Key Cryptography for RFID-Tags Proceedings of 4th IEEE International Workshop on Pervasive Computing and Communication Security, 2007.
-
(2007)
Proceedings of 4th IEEE International Workshop on Pervasive Computing and Communication Security
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
8
-
-
77953885098
-
A milestone towards RFID products offering asymmetric authentication based on elliptic curve cryptography
-
H. Bock, M. Braun, M. Dichtl, E. Hess, J. Heyszl, W. Kargl, H. Koroschetz, B. Meyer, and H. Seuschek. A Milestone Towards RFID Products Offering Asymmetric Authentication Based on Elliptic Curve Cryptography. Proceedings of the Workshop on RFID Security, 2008.
-
(2008)
Proceedings of the Workshop on RFID Security
-
-
Bock, H.1
Braun, M.2
Dichtl, M.3
Hess, E.4
Heyszl, J.5
Kargl, W.6
Koroschetz, H.7
Meyer, B.8
Seuschek, H.9
-
10
-
-
34547363189
-
Fourth factor authentication: Somebody you know
-
J. Brainard, A. Juels, R. Rivest, M. Szydlo, and M. Yung. Fourth Factor Authentication: Somebody You Know. Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
-
-
Brainard, J.1
Juels, A.2
Rivest, R.3
Szydlo, M.4
Yung, M.5
-
14
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. van Oorschot, and M. Wiener. Authentication and Authenticated Key Exchanges. Designs, Codes and Cryptography 2 (2), 1992.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, Issue.2
-
-
Diffie, W.1
Van Oorschot, P.2
Wiener, M.3
-
18
-
-
77954937268
-
Proof of possession: Using RFID for large-scale authorization management
-
E. Grummt, and R. Ackermann. Proof of Possession: Using RFID for large-scale Authorization Management. Proceedings of AmI-07 Workshops, 2008.
-
(2008)
Proceedings of AmI-07 Workshops
-
-
Grummt, E.1
Ackermann, R.2
-
25
-
-
17444406680
-
A generalized temporal role-based access control model
-
J. Joshi, E. Bertino, U. Latif, and A. Ghafoor. A Generalized Temporal Role-Based Access Control Model. IEEE Transactions on Knowledge and Data Engineering 17(1), 2005.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.1
-
-
Joshi, J.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
31
-
-
35348826790
-
Physical access control for captured RFID data
-
T. Kriplean, E. Welbourne, N. Khoussainova, V. Rastogi, M. Balazinska, G. Borriello, T. Kohno, and D. Suciu. Physical Access Control for Captured RFID Data. IEEE Pervasive Computing (6) 4, 2007.
-
(2007)
IEEE Pervasive Computing
, vol.6
, Issue.4
-
-
Kriplean, T.1
Welbourne, E.2
Khoussainova, N.3
Rastogi, V.4
Balazinska, M.5
Borriello, G.6
Kohno, T.7
Suciu, D.8
-
38
-
-
0030086382
-
Role-based access control models
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-Based Access Control Models. IEEE Computer 29(2), 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
39
-
-
53349116472
-
RFID in the supply chain: Panacea or pandora's box?
-
B. Santos, and L. Smith. RFID in the supply chain: panacea or pandora's box? Communications of the ACM 51(10), 2008.
-
(2008)
Communications of the ACM
, vol.51
, Issue.10
-
-
Santos, B.1
Smith, L.2
-
40
-
-
0035517988
-
Radio frequency identification and the electronic product code
-
S. Sarma, D. Brock, and D. Engels. Radio frequency identification and the electronic product code. IEEE Micro 21(6), 2001.
-
(2001)
IEEE Micro
, vol.21
, Issue.6
-
-
Sarma, S.1
Brock, D.2
Engels, D.3
|