-
1
-
-
24944575863
-
Cryptographic approach to "privacy-friendly" tags
-
MIT, Massachusetts, USA, November
-
M. Ohkubo, K. Suzuki, and S. Kinoshita, "Cryptographic approach to "privacy-friendly" tags, " in RFID Privacy Workshop, MIT, Massachusetts, USA, November 2003.
-
(2003)
RFID Privacy Workshop
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
2
-
-
77957552862
-
-
Tech. Rep., available at
-
M. Brusó, K. Chatzikokolakis, and J. den Hartog, "Formal verification of privacy for rfid systems, " Tech. Rep., 2009, available at http://www.win.tue.nl/-kostas/.
-
(2009)
Formal Verification of Privacy for Rfid Systems
-
-
Brusó, M.1
Chatzikokolakis, K.2
Hartog, J.D.3
-
3
-
-
17644411480
-
Mobile values, new names, and secure communication
-
M. Abadi and C. Fournet, "Mobile values, new names, and secure communication, " in POPL, 2001, pp. 104-115.
-
(2001)
POPL
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
4
-
-
0002521052
-
A calculus of mobile processes
-
R. Milner, J. Parrow, and D. Walker, "A calculus of mobile processes, " I and II. Information and Computation, vol. 100, 1989.
-
(1989)
I and II. Information and Computation
, vol.100
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
5
-
-
34547630116
-
Secure anonymous RFID authentication protocols
-
Department of Computer Science, Tallahassee, Florida, USA
-
C. Chatmon, T. van Le, and M. Burmester, "Secure anonymous RFID authentication protocols, " Florida State University, Department of Computer Science, Tallahassee, Florida, USA, Technical Report TR-060112, 2006.
-
(2006)
Florida State University, Technical Report TR-060112
-
-
Chatmon, C.1
Le, T.V.2
Burmester, M.3
-
6
-
-
44649113207
-
Untraceability of rfid protocols
-
ser. Lecture Notes in Computer Science, 5019. Springer
-
T. van Deursen, S. Mauw, and S. Radomirovic, "Untraceability of rfid protocols, " in Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, ser. Lecture Notes in Computer Science, vol. 5019. 5019. Springer, 2008, p. 115.
-
(2008)
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks
, vol.5019
, pp. 115
-
-
Van Deursen, T.1
Mauw, S.2
Radomirovic, S.3
-
7
-
-
77950308134
-
Untraceability in the applied pi calculus
-
to appear
-
M. Arapinis, T. Chothia, E. Ritter, and M. Ryan, "Untraceability in the applied pi calculus, " in proceedings of the 1st Int. Workshop on RFID Security and Cryptography., 2009, to appear.
-
(2009)
Proceedings of the 1st Int. Workshop on RFID Security and Cryptography
-
-
Arapinis, M.1
Chothia, T.2
Ritter, E.3
Ryan, M.4
-
9
-
-
34547687590
-
Defining strong privacy for RFID
-
IEEE. New York City, New York, USA: IEEE Computer Society Press, March
-
A. Juels and S. Weis, "Defining strong privacy for RFID, " in International Conference on Pervasive Computing and Communications - PerCom 2007, IEEE. New York City, New York, USA: IEEE Computer Society Press, March 2007, pp. 342-347.
-
(2007)
International Conference on Pervasive Computing and Communications - PerCom 2007
, pp. 342-347
-
-
Juels, A.1
Weis, S.2
-
10
-
-
33744939250
-
Adversary model for radio frequency identification
-
Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland, September
-
G. Avoine, "Adversary model for radio frequency identification, " Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland, Technical Report LASEC-REPORT-2005- 001, September 2005.
-
(2005)
Swiss Federal Institute of Technology (EPFL), Technical Report LASEC-REPORT-2005-001
-
-
Avoine, G.1
-
11
-
-
41549161615
-
Privacy of recent RFID authentication protocols
-
ser. Lecture Notes in Computer Science, Sydney, Australia: Springer, April
-
K. Ouafi and R. C.-W. Phan, "Privacy of recent RFID authentication protocols, " in 4th International Conference on Information Security Practice and Experience - ISPEC 2008, ser. Lecture Notes in Computer Science, vol. 4991. Sydney, Australia: Springer, April 2008, pp. 263-277.
-
(2008)
4th International Conference on Information Security Practice and Experience - ISPEC 2008
, vol.4991
, pp. 263-277
-
-
Ouafi, K.1
Phan, R.C.-W.2
-
12
-
-
68249084846
-
Verifying privacytype properties of electronic voting protocols
-
S. Delaune, S. Kremer, and M. Ryan, "Verifying privacytype properties of electronic voting protocols, " Journal of Computer Security, vol. 17, no. 4, pp. 435-487, 2009.
-
(2009)
Journal of Computer Security
, vol.17
, Issue.4
, pp. 435-487
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.3
-
13
-
-
21144438831
-
Security and privacy aspects of low-cost radio frequency identification systems
-
ser. Lecture Notes in Computer Science, D. Hutter, G. Müller, W. Stephan, and M. Ullmann, Eds., Boppard, Germany: Springer-Verlag, March
-
S. Weis, S. Sarma, R. Rivest, and D. Engels, "Security and privacy aspects of low-cost radio frequency identification systems, " in International Conference on Security in Pervasive Computing - SPC 2003, ser. Lecture Notes in Computer Science, D. Hutter, G. Müller, W. Stephan, and M. Ullmann, Eds., vol. 2802. Boppard, Germany: Springer-Verlag, March 2003, pp. 454-469.
-
(2003)
International Conference on Security in Pervasive Computing - SPC 2003
, vol.2802
, pp. 454-469
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
14
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
IEEE Computer Society
-
B. Blanchet, "An efficient cryptographic protocol verifier based on prolog rules, " in CSFW. IEEE Computer Society, 2001, pp. 82-96.
-
(2001)
CSFW
, pp. 82-96
-
-
Blanchet, B.1
-
15
-
-
3543058869
-
Automatic proof of strong secrecy for security protocols
-
IEEE Computer Society
-
-, "Automatic proof of strong secrecy for security protocols, " in IEEE Symposium on Security and Privacy. IEEE Computer Society, 2004, pp. 86-100.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 86-100
-
-
-
16
-
-
33749408130
-
-
Ph.D. dissertation, EPFL, Lausanne, Switzerland, Dec.
-
G. Avoine, "Cryptography in radio frequency identification and fair exchange protocols, " Ph.D. dissertation, EPFL, Lausanne, Switzerland, Dec. 2005.
-
(2005)
Cryptography in Radio Frequency Identification and Fair Exchange Protocols
-
-
Avoine, G.1
-
17
-
-
55649115408
-
Provably secure ubiquitous systems: Universally composable RFID authentication protocols
-
Baltimore, Maryland, USA: IEEE, August-September
-
M. Burmester, T. v. Le, and B. d. Medeiros, "Provably secure ubiquitous systems: universally composable RFID authentication protocols, " in Conference on Security and Privacy for Emerging Areas in Communication Networks - SecureComm. Baltimore, Maryland, USA: IEEE, August-September 2006.
-
(2006)
Conference on Security and Privacy for Emerging Areas in Communication Networks - SecureComm
-
-
Burmester, M.1
Le, T.V.2
Medeiros, B.D.3
-
18
-
-
38149038702
-
On privacy models for RFID
-
ser. Lecture Notes in Computer Science, Kuching, Malaysia: Springer-Verlag, December
-
S. Vaudenay, "On privacy models for RFID, " in Advances in Cryptology - Asiacrypt 2007, ser. Lecture Notes in Computer Science, vol. 4833. Kuching, Malaysia: Springer-Verlag, December 2007, pp. 68-87.
-
(2007)
Advances in Cryptology - Asiacrypt 2007
, vol.4833
, pp. 68-87
-
-
Vaudenay, S.1
-
19
-
-
77957559043
-
Analysing unlinkability and anonymity using the applied pi calculus
-
to appear
-
M. Arapinis, T. Chothia, E. Ritter, and M. Ryan, "Analysing unlinkability and anonymity using the applied pi calculus, " in proceedings of CSF 2010, 2010, to appear.
-
(2010)
Proceedings of CSF 2010
-
-
Arapinis, M.1
Chothia, T.2
Ritter, E.3
Ryan, M.4
-
20
-
-
71549173414
-
Verifying anonymous credential systems in applied pi calculus
-
Berlin, Heidelberg: Springer-Verlag
-
X. Li, Y. Zhang, and Y. Deng, "Verifying anonymous credential systems in applied pi calculus, " in CANS '09: Proceedings of the 8th International Conference on Cryptology and Network Security. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 209-225.
-
(2009)
CANS '09: Proceedings of the 8th International Conference on Cryptology and Network Security
, pp. 209-225
-
-
Li, X.1
Zhang, Y.2
Deng, Y.3
-
21
-
-
50249164303
-
Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol
-
Washington, DC, USA: IEEE Computer Society
-
M. Backes, M. Maffei, and D. Unruh, "Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol, " in SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 2008, pp. 202- 215.
-
(2008)
SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 202-215
-
-
Backes, M.1
Maffei, M.2
Unruh, D.3
|