-
1
-
-
77957601097
-
ISO 15408-2: Common criteria for information technology security evaluation - Part 2: Security functional components
-
July
-
ISO 15408-2: Common Criteria for Information Technology Security Evaluation - Part 2: Security functional components. Final draft, ISO/IEC, July 2009.
-
(2009)
Final Draft, ISO/IEC
-
-
-
2
-
-
0035035153
-
Mobile values, new names, and secure communication
-
Martín Abadi and Cédric Fournet. Mobile values, new names, and secure communication. SIGPLAN Not., 36(3):104-115, 2001.
-
(2001)
SIGPLAN Not.
, vol.36
, Issue.3
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
5
-
-
33745621564
-
Reducing time complexity in RFID systems
-
Bart Preneel and Stafford Tavares, Editors, Kingston, Canada, August, Volume 3897 of Lecture Notes in Computer Science
-
Gildas Avoine, Etienne Dysli, and Philippe Oechslin. Reducing time complexity in RFID systems. In Bart Preneel and Stafford Tavares, editors, Selected Areas in Cryptography - SAC 2005, volume 3897 of Lecture Notes in Computer Science, pages 291-306, Kingston, Canada, August 2005.
-
(2005)
Selected Areas in Cryptography - SAC 2005
, pp. 291-306
-
-
Avoine, G.1
Dysli, E.2
Oechslin, P.3
-
6
-
-
34250013678
-
A face is exposed for aol searcher no. 4417749
-
August 9
-
Michael Barbaro and Tom Zeller Jr. A face is exposed for aol searcher no. 4417749. The New York Times, August 9, 2006.
-
(2006)
The New York Times
-
-
Barbaro, M.1
Zeller Jr., T.2
-
7
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
Washington, DC, USA, 2001. IEEE Computer Society
-
Bruno Blanchet. An efficient cryptographic protocol verifier based on prolog rules. In CSFW '01: Proceedings of the 14th IEEE workshop on Computer Security Foundations, page 82, Washington, DC, USA, 2001. IEEE Computer Society.
-
CSFW '01: Proceedings of the 14th IEEE Workshop on Computer Security Foundations
, pp. 82
-
-
Blanchet, B.1
-
8
-
-
50049108255
-
Provably secure ubiquitous systems: Universally composable RFID authentication protocols
-
Baltimore, Maryland, USA, August-September, IEEE
-
Mike Burmester, Tri van Le, and Breno de Medeiros. Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols. In Conference on Security and Privacy for Emerging Areas in Communication Networks - SecureComm, Baltimore, Maryland, USA, August-September 2006. IEEE.
-
(2006)
Conference on Security and Privacy for Emerging Areas in Communication Networks - SecureComm
-
-
Burmester, M.1
Van Le, T.2
De Medeiros, B.3
-
9
-
-
77957585568
-
Christopher caldwell. A pass on privacy?
-
July 17
-
Christopher Caldwell. A pass on privacy? The New York Times, July 17, 2005.
-
(2005)
The New York Times
-
-
-
10
-
-
33750561653
-
Analysing the MUTE anonymous file-sharing system using the pi-calculus
-
Springer, Volume 4229 of LNCS
-
Tom Chothia. Analysing the MUTE anonymous file-sharing system using the pi-calculus. In FORTE, volume 4229 of LNCS, pages 115- 130. Springer, 2006.
-
(2006)
FORTE
, pp. 115-130
-
-
Chothia, T.1
-
13
-
-
78049375173
-
Untraceability of RFID protocols
-
Springer, Volume 5019. 5019 of Lecture Notes in Computer Science
-
Ton van Deursen, Sjouke Mauw, and Saša Radomirovíc. Untraceability of RFID protocols. In Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, volume 5019. 5019 of Lecture Notes in Computer Science, page 115. Springer, 2008.
-
(2008)
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks
, pp. 115
-
-
Deursen, T.V.1
Mauw, S.2
Radomirovíc, S.3
-
15
-
-
31844437820
-
Provable anonymity
-
Alexandria, VA, USA, November
-
Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, and Peter van Rossum. Provable anonymity. In Proceedings of the 3rd ACM Workshop on Formal Methods in Security Engineering (FMSE05), Alexandria, VA, USA, November 2005.
-
(2005)
Proceedings of the 3rd ACM Workshop on Formal Methods in Security Engineering (FMSE05)
-
-
Garcia, F.D.1
Hasuo, I.2
Pieters, W.3
Rossum, P.V.4
-
16
-
-
20844459862
-
RFID privacy: An overview of problems and proposed solutions
-
Simson L. Garfinkel, Ari Juels, and Ravi Pappu. RFID privacy: An overview of problems and proposed solutions. IEEE Security and Privacy, 3(3):34-43, 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 34-43
-
-
Garfinkel, S.L.1
Juels, A.2
Pappu, R.3
-
17
-
-
77957552079
-
Defects in e-passports allow real-time tracking
-
26th January
-
Dan Goodin. Defects in e-passports allow real-time tracking. The Register, 26th January 2010.
-
(2010)
The Register
-
-
Goodin, D.1
-
19
-
-
34547687590
-
Defining strong privacy for RFID
-
Washington, DC, USA, IEEE Computer Society
-
Ari Juels and Stephen A. Weis. Defining strong privacy for RFID. In PERCOMW '07: Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops, pages 342-347, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
PERCOMW '07: Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
, pp. 342-347
-
-
Juels, A.1
Weis, S.A.2
-
20
-
-
74049091231
-
Epc rfid tag security weaknesses and defenses: Passport cards, enhanced drivers licenses, and beyond
-
Karl Koscher, Ari Juels, Vjekoslav Brajkovic, and Tadayoshi Kohno. Epc rfid tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond. In ACM Conference on Computer and Communications Security, pages 33-42, 2009.
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 33-42
-
-
Koscher, K.1
Juels, A.2
Brajkovic, V.3
Kohno, T.4
-
21
-
-
37349045142
-
PKI for machine readable travel documents offering icc read-only access
-
PKI Task Force
-
PKI Task Force. PKI for machine readable travel documents offering icc read-only access. Technical report, International Civil Aviation Organization, 2004.
-
(2004)
Technical Report, International Civil Aviation Organization
-
-
-
24
-
-
21144438831
-
Security and privacy aspects of low-cost radio
-
Hutter, D. Müller, G. Stephan, W. Ullman, M. eds.:, Boppard, Germany, Springer-Verlag, march, Volume 2802 of LNCS
-
Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, and Daniel W. Engels. Security and privacy aspects of low-cost radio. In Hutter, D., Müller, G., Stephan, W., Ullman, M., eds.: International Conference on Security in Pervasive Computing - SPC 2003, volume 2802 of LNCS, Boppard, Germany, pages 454-469. Springer-Verlag, march 2003.
-
(2003)
International Conference on Security in Pervasive Computing - SPC 2003
, pp. 454-469
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
|