-
1
-
-
51349134046
-
S3PR: Secure serverless search protocols for RFID
-
Busan, Korea
-
Ahamed, S. I., Rahman, F., Hoque, E., Kawsar, F., Nakajima, T., et al. (2008). S3PR: Secure serverless search protocols for RFID. In The proceedings of second IEEE international conference on information security and assurance (ISA 2008), Busan, Korea, pp. 187-192.
-
(2008)
The Proceedings of Second IEEE International Conference on Information Security and Assurance (ISA 2008)
, pp. 187-192
-
-
Ahamed, S.I.1
Rahman, F.2
Hoque, E.3
Kawsar, F.4
Nakajima, T.5
-
2
-
-
70350157100
-
YA-SRAP: Yet another serverless RFID authentication protocol
-
Seattle, USA
-
Ahamed, S. I., Rahman, F., Hoque, E., Kawsar, F., Nakajima, T., et al. (2008). YA-SRAP: Yet another serverless RFID authentication protocol. In The 4th IET international conference on intelligent environment (IE08), Seattle, USA, pp. 1-8.
-
(2008)
The 4th IET International Conference on Intelligent Environment (IE08)
, pp. 1-8
-
-
Ahamed, S.I.1
Rahman, F.2
Hoque, E.3
Kawsar, F.4
Nakajima, T.5
-
3
-
-
26444443915
-
A scalable and provably secure hash based RFID protocol
-
Kauai Island, Hawaii, USA: IEEE Computer Society Press
-
Avoine, G., Oechslin., P., et al. (2005). A scalable and provably secure hash based RFID protocol. In International workshop on pervasive computing and communication security (PerSec '05) (pp. 110-114). Kauai Island, Hawaii, USA: IEEE Computer Society Press.
-
(2005)
International Workshop on Pervasive Computing and Communication Security (PerSec '05)
, pp. 110-114
-
-
Avoine, G.1
Oechslin, P.2
-
4
-
-
55649115408
-
Provably secure ubiquitous systems: Universally composable RFID authentication protocols
-
Baltimore, Maryland, USA: IEEE
-
Burmester,M., Le, T. V., de Medeiros, B., et al. (2006). Provably secure ubiquitous systems: Universally composable RFID authentication protocols. In Conference on security and privacy for emerging areas in communication networks (SecureComm) (pp. 1-9). Baltimore, Maryland, USA: IEEE.
-
(2006)
Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm)
, pp. 1-9
-
-
Burmester, M.1
Le, T.V.2
De Medeiros, B.3
-
5
-
-
34547672707
-
RIPP-FS: An RFID identification, privacy preserving protocol with forward secrecy
-
New York, USA: IEEE Computer Society Press
-
Conti, M., Pietro, R. D., Mancini, L. V., Spognardi, A., et al. (2007). RIPP-FS: An RFID identification, privacy preserving protocol with forward secrecy. In International workshop on pervasive computing and communication security (PerSec '07) (pp. 229-234). New York, USA: IEEE Computer Society Press.
-
(2007)
International Workshop on Pervasive Computing and Communication Security (PerSec '07)
, pp. 229-234
-
-
Conti, M.1
Pietro, R.D.2
Mancini, L.V.3
Spognardi, A.4
-
6
-
-
34547653526
-
Lightweight asymmetric privacy-preserving authentication protocols secure against active attack
-
New York, USA: IEEE Computer Society Press
-
Cui, Y., Kobara, K., Matsuura, K., Imai, H., et al. (2007). Lightweight asymmetric privacy-preserving authentication protocols secure against active attack. In International workshop on pervasive computing and communication security (PerSec '07) (pp. 223-228). New York, USA: IEEE Computer Society Press.
-
(2007)
International Workshop on Pervasive Computing and Communication Security (PerSec '07)
, pp. 223-228
-
-
Cui, Y.1
Kobara, K.2
Matsuura, K.3
Imai, H.4
-
7
-
-
33845429016
-
A case against currently used hash functions in RFID protocols
-
OTM 2006 workshops
-
Feldhofer, M., Rechberger, C., et al. (2006). A case against currently used hash functions in RFID protocols. In On the move to meaningful internet systems 2006: OTM 2006 workshops, pp. 372-381.
-
(2006)
On the Move to Meaningful Internet Systems 2006
, pp. 372-381
-
-
Feldhofer, M.1
Rechberger, C.2
-
8
-
-
33144457479
-
RFID security and privacy: A research survey
-
Juels, A. (2006). RFID security and privacy: A research survey. Journal of Selected Areas in Communications, 24(2), 381-394.
-
(2006)
Journal of Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
9
-
-
34547687590
-
Defining strong privacy for RFID
-
Juels, A., Weis, S., et al. (2007). Defining strong privacy for RFID. In Pervasive computing and communications workshops, 2007. PerCom Workshops '07, pp. 342-347.
-
(2007)
Pervasive Computing and Communications Workshops, 2007. PerCom Workshops '07
, pp. 342-347
-
-
Juels, A.1
Weis, S.2
-
10
-
-
33745597876
-
A scalable, delegatable pseudonym protocol enabling owner-ship transfer of RFID tags
-
Kingston, Canada: Springer-Verlag
-
Molnar, D., Soppera, A., Wagner, D., et al. (2005). A scalable, delegatable pseudonym protocol enabling owner-ship transfer of RFID tags. In Proceedings of selected areas in cryptography (SAC 2005) (Vol. 3897, pp. 276-290). Kingston, Canada: Springer-Verlag.
-
(2005)
Proceedings of Selected Areas in Cryptography (SAC 2005)
, vol.3897
, pp. 276-290
-
-
Molnar, D.1
Soppera, A.2
Wagner, D.3
-
11
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
Washington DC, USA
-
Molnar, D., Wagner, D., et al. (2004). Privacy and security in library RFID: Issues, practices, and architectures. In Proceedings of the 11th ACM conference on computer and communications security, Washington DC, USA, pp. 210-219.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
12
-
-
24944575863
-
Cryptographic approach to "privacy-friendly" tags
-
MA, USA: MIT
-
Ohkubo, M., Suzuki, K., Kinoshita, S., et al. (2003). Cryptographic approach to "privacy-friendly" tags. In RFID privacy workshop. MA, USA: MIT.
-
(2003)
RFID Privacy Workshop
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
13
-
-
32844473946
-
The evolution of RFID security
-
Rieback, M., Crispo, B., & Tanenbaum, A., et al. (2006). The evolution of RFID security. Journal of IEEE Pervasive Computing, 5(1), 62-69.
-
(2006)
Journal of IEEE Pervasive Computing
, vol.5
, Issue.1
, pp. 62-69
-
-
Rieback, M.1
Crispo, B.2
Tanenbaum, A.3
-
14
-
-
33749406338
-
Scalable and untraceable authentication protocol for RFID
-
Lecture Notes in Computer Science, Seoul, Korea
-
Seo, Y., Kim, K., et al. (2006). Scalable and untraceable authentication protocol for RFID. In International workshop on security in ubiquitous computing systems-Secubiq 2006, Lecture Notes in Computer Science, Seoul, Korea.
-
(2006)
International Workshop on Security in Ubiquitous Computing Systems-Secubiq 2006
-
-
Seo, Y.1
Kim, K.2
-
16
-
-
34247465966
-
A distributed architecture for scalable private RFID tag identification
-
Solanas, A., Domingo-Ferrer, J., Martínez-Ballesté, A., Daza, V., et al. (2007). A distributed architecture for scalable private RFID tag identification. Journal of Computer Networks, 51(9), 2268-2279.
-
(2007)
Journal of Computer Networks
, vol.51
, Issue.9
, pp. 2268-2279
-
-
Solanas, A.1
Domingo-Ferrer, J.2
Martínez-Ballesté, A.3
Daza, V.4
-
17
-
-
34547635774
-
Severless search and authentication protocols for RFID
-
New York, USA
-
Tan, C. C., Sheng, B., Li, Q., et al. (2007). Severless search and authentication protocols for RFID. In Proceedings of the fifth annual IEEE international conference on pervasive computing and communications (PerCom '07), New York, USA, pp. 3-12.
-
(2007)
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom '07)
, pp. 3-12
-
-
Tan, C.C.1
Sheng, B.2
Li, Q.3
-
19
-
-
33644534001
-
Lightweight authentication protocols for low-cost RFID tags
-
Seattle, WA, USA
-
Vajda, I., Buttyán, L., et al. (2003). Lightweight authentication protocols for low-cost RFID tags. In Second workshop on security in ubiquitous computing (Ubicomp '03), Seattle, WA, USA.
-
(2003)
Second Workshop on Security in Ubiquitous Computing (Ubicomp '03)
-
-
Vajda, I.1
Buttyán, L.2
-
20
-
-
21144438831
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Boppard, Germany: Springer
-
Weis, S. A., Sarma, S. E., Rivest, R. L., Engels, D. W., et al. (2003). Security and privacy aspects of low-cost radio frequency identification systems. In International conference on security in pervasive computing-SPC 2003 (Vol. 2802, pp. 454-469). Boppard, Germany: Springer.
-
(2003)
International Conference on Security in Pervasive Computing-SPC 2003
, vol.2802
, pp. 454-469
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
|