-
1
-
-
2942614621
-
-
Master Thesis, Massachusetts Institute of Technology (MIT), Massachusetts, USA
-
Weis, S. Security and Privacy in Radio-Frequency Identification Devices, Master Thesis, Massachusetts Institute of Technology (MIT), Massachusetts, USA, 2003
-
(2003)
Security and Privacy in Radio-Frequency Identification Devices
-
-
Weis, S.1
-
3
-
-
2942556410
-
Radio-frequency identification: Security risks and challenges
-
Spring
-
Sarma, S., Weis, S. and Engels, D. Radio-Frequency Identification: Security Risks and Challenges, Cryptobytes, RSA Laboratories, Vol. 6. Issue 1., pp. 2-9., Spring 2003.
-
(2003)
Cryptobytes, RSA Laboratories
, vol.6
, Issue.1
, pp. 2-9
-
-
Sarma, S.1
Weis, S.2
Engels, D.3
-
4
-
-
21144438831
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Boppard, Germany, March
-
Weis, S., Sarma, S. Rivest, R. and Engels, D. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems, International Conference on Security in Pervasive Computing - SPC 2003, pp. 454-469, Boppard, Germany, March 2003.
-
(2003)
International Conference on Security in Pervasive Computing - SPC 2003
, pp. 454-469
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
5
-
-
24944575863
-
Cryptographic approach to "Privacy-friendly"
-
MIT, MA, USA, November
-
Ohkubo, M., Suzuki, K. and Kinoshita, S. Cryptographic Approach to "Privacy-Friendly" Tags, RFID Privacy Workshop, MIT, MA, USA, November 2003.
-
(2003)
Tags, RFID Privacy Worksho
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
6
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
Washington, DC, USA, Oct
-
Molnar, D. and Wagner, D. Privacy and Security in Library RFID: Issues, Practices, and Architectures, Conference on Computer and Communications Security, pp. 210-219, Washington, DC, USA, Oct 2004.
-
(2004)
Conference on Computer and Communications Securit
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
7
-
-
84940024494
-
Quantifying information leakage in tree-based hash protocols
-
Raleigh, North Carolina, USA, Dec
-
Nohl, K. and Evans, D. Quantifying Information Leakage in Tree-Based Hash Protocols, Conference on Information and Communications Security - ICICS'06, pp. 228-237, Raleigh, North Carolina, USA, Dec 2006.
-
(2006)
Conference on Information and Communications Security - ICICS'0
, pp. 228-237
-
-
Nohl, K.1
Evans, D.2
-
8
-
-
33749005411
-
Quantitative evaluation of unlinkable ID matching schemes
-
Alexandria, Virginia, USA, Nov
-
Nohara, Y., Inoue, S. Baba, K. and Yasuura, H. Quantitative Evaluation of Unlinkable ID Matching Schemes, Workshop on Privacy in the Electronic Society - WPES, pp. 55-60, Alexandria, Virginia, USA, Nov 2006.
-
(2006)
Workshop on Privacy in the Electronic Society - WPE
, pp. 55-60
-
-
Nohara, Y.1
Inoue, S.2
Baba, K.3
Yasuura, H.4
-
9
-
-
67249096898
-
Optimal key-trees for tree-based private authentication
-
Cambridge, United Kingdom, June
-
Buttyán, L., Holczer, T. and Vajda, I. Optimal Key-Trees for Tree-Based Private Authentication, Workshop on Privacy Enhancing Technologies - PET 2006, Cambridge, United Kingdom, June 2006.
-
(2006)
Workshop on Privacy Enhancing Technologies - PET 200
-
-
Buttyán, L.1
Holczer, T.2
Vajda, I.3
-
10
-
-
33845476062
-
A lightweight mutual authentication protocol for RFID networks
-
Luo, Z., Chan, T. and Li, J. S. A Lightweight Mutual Authentication Protocol for RFID Networks, International Conference on e-Business Engineering, pp. 620-625, 2005.
-
(2005)
International Conference on E-Business Engineerin
, pp. 620-625
-
-
Luo, Z.1
Chan, T.2
Li, J.S.3
-
11
-
-
77955101104
-
-
OMNeT++ Community Site. http://www.omnetpp.org
-
-
-
-
12
-
-
51149098609
-
Improved lightweight mutual authentication protocol for RFID systems
-
Toulouse, France, Sept 30 - Oct 2
-
Gy. Gódor, M. Antal, Improved Lightweight Mutual Authentication Protocol for RFID Systems, 13th IFIP International Conference on Personal Wireless Communications, Toulouse, France, Sept 30 - Oct 2, 2008
-
(2008)
13th IFIP International Conference on Personal Wireless Communication
-
-
Gódor, Gy.1
Antal, M.2
-
13
-
-
67249143972
-
Mutual authentication protocol for low computational capacity RFID systems
-
New Orleans, LA, USA, 30 Nov - 4 Dec
-
Gy. Gódor, M. Antal, S. Imre, Mutual Authentication Protocol for Low Computational Capacity RFID Systems, IEEE Globecom 2008 CCNS, New Orleans, LA, USA, 30 Nov - 4 Dec, 2008
-
(2008)
IEEE Globecom 2008 CCN
-
-
Gy. Gódor1
Antal, M.2
Imre, S.3
-
14
-
-
84955593890
-
Fast hashing on the pentium
-
Bosselaers, A., Govaerts, R., and Vandewalle, J. Fast Hashing on the Pentium, Lecture Notes in Computer Science, pp. 298-313, 1996
-
(1996)
Lecture Notes in Computer Scienc
, pp. 298-313
-
-
Bosselaers, A.1
Govaerts, R.2
Vandewalle, J.3
-
16
-
-
84977783611
-
Strong and robust RFID authentication enabling perfect ownership transfer
-
Lim, C. H., and Kwon, T. Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer, Lecture Notes in Computer Science, 2006
-
(2006)
Lecture Notes in Computer Science
-
-
Lim, C.H.1
Kwon, T.2
-
17
-
-
34247218520
-
Tomoyuki asano and kwangjo kim RFID mutual authentication scheme based on synchronized secret information
-
Sangshin Lee, Tomoyuki Asano and Kwangjo Kim RFID Mutual Authentication Scheme based on Synchronized Secret Information, The 2006 Symposium on Cryptography and Information Security (SCIS), 2006.
-
(2006)
The 2006 Symposium on Cryptography and Information Security (SCIS)
-
-
Lee, S.1
-
19
-
-
77955119065
-
-
Retrieved March 22, 2009, from
-
Stamatiou, P. Privacy Implications of RFID Tags, 2007. Retrieved March 22, 2009, from http://paulstamatiou.com/wp-content/uploads/2007/11/pstam-rfid- paper.pdf
-
(2007)
Privacy Implications of RFID Tags
-
-
Stamatiou, P.1
|