-
1
-
-
33751546328
-
Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards
-
February
-
H. Chien and C. Chen, "Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards," Computer Standards & Interfaces, 29(2):254-259, February 2007.
-
(2007)
Computer Standards & Interfaces
, vol.29
, Issue.2
, pp. 254-259
-
-
Chien, H.1
Chen, C.2
-
2
-
-
24944575863
-
Cryptographic approach to 'privacy-friendly tags'
-
MIT, MA, USA, November
-
M. Ohkubo, K. Suzki, and S. Kinoshita, "Cryptographic approach to 'privacy-friendly tags'," In RFID Privacy Workshop, MIT, MA, USA, November 2003. http://www.rfidprivacy.us/2003/agenda.php.
-
(2003)
RFID Privacy Workshop
-
-
Ohkubo, M.1
Suzki, K.2
Kinoshita, S.3
-
3
-
-
24644501824
-
Challengeresponse based on RFID authentication protocol for distributed database environment
-
D. Hutter and M. Ullmann, editors, volume 3450 of Lecture Notes in Computer Science, Boppard, Germany, April, Springer-Verlag, Berlin
-
K. Rhee, J. Kwak, S. Kim, and D. Won, "Challengeresponse based on RFID authentication protocol for distributed database environment," In D. Hutter and M. Ullmann, editors, International Conference on Security in Pervasive Computing - SPC 2005, volume 3450 of Lecture Notes in Computer Science, pages 70-84, Boppard, Germany, April 2005. Springer-Verlag, Berlin.
-
(2005)
International Conference on Security in Pervasive Computing-SPC 2005
, pp. 70-84
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
Won, D.4
-
4
-
-
67650109513
-
Enhancing security of EPCglobal gen-2 RFID tag against traceability and cloning
-
Hiroshima, Japan, January
-
D. Duc, J. Park, H. Lee, and K. Kim, "Enhancing security of EPCglobal gen-2 RFID tag against traceability and cloning," In Symposium on Cryptography and Information Security 2006, Hiroshima, Japan, January 2006.
-
(2006)
Symposium on Cryptography and Information Security 2006
-
-
Duc, D.1
Park, J.2
Lee, H.3
Kim, K.4
-
5
-
-
56749103027
-
RFID authentication protocol for low-cost tags
-
V. D. Gligor, J. Hubaux, and R. Poovendran, editors, Alexandria, Virginia, USA, April, ACM Press
-
B. Song and C. J. Mitchell, "RFID authentication protocol for low-cost tags," In V. D. Gligor, J. Hubaux, and R. Poovendran, editors, ACM Conference on Wireless Network Security - WiSec'08, pages 140-147, Alexandria, Virginia, USA, April 2008. ACM Press.
-
(2008)
ACM Conference on Wireless Network Security-WiSec'08
, pp. 140-147
-
-
Song, B.1
Mitchell, C.J.2
-
6
-
-
33847330246
-
A lightweight RFID protocol to protect against traceability and cloning attacks
-
Athens, Greece, September, IEEE
-
T. Dimitriou, "A lightweight RFID protocol to protect against traceability and cloning attacks," In Conference on Security and Privacy for Emerging Areas in Communication Networks - SecureComm 2005, pages 59-66, Athens, Greece, September 2005. IEEE.
-
(2005)
Conference on Security and Privacy for Emerging Areas in Communication Networks-SecureComm 2005
, pp. 59-66
-
-
Dimitriou, T.1
-
7
-
-
2942625823
-
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
-
R. Sandhu and R. Thomas, editors, Orlando, Florida, USA, March, IEEE Computer Society
-
A. Henrici and P. Muller, "Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers," In R. Sandhu and R. Thomas, editors, International Workshop on Pervasive Computing and Communication Security - PerSec 2004, pages 149-153, Orlando, Florida, USA, March 2004. IEEE Computer Society.
-
(2004)
International Workshop on Pervasive Computing and Communication Security-PerSec 2004
, pp. 149-153
-
-
Henrici, A.1
Muller, P.2
-
8
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
B. Pfitzmann and P. Liu, editors, Washington, DC, USA, October, ACM Press
-
D. Molnar and D. Wagner, "Privacy and security in library RFID: issues, practices, and architectures," In B. Pfitzmann and P. Liu, editors, Conference on Computer and Communications Security - ACM CCS, pages 210-219, Washington, DC, USA, October 2004. ACM Press.
-
(2004)
Conference on Computer and Communications Security-ACM CCS
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
9
-
-
38149047468
-
Lowcost and strong-security RFID authentication protocol
-
volume 4809 of Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
J. Ha, S.J. Moon, J.M. Gonzlez Nieto, and C. Boyd, "Lowcost and strong-security RFID authentication protocol," In EUC Workshops 2007, volume 4809 of Lecture Notes in Computer Science, pages 795-807, 2007. Springer-Verlag, Berlin.
-
(2007)
EUC Workshops 2007
, pp. 795-807
-
-
Ha, J.1
Moon, S.J.2
Nieto, J.M.G.3
Boyd, C.4
-
10
-
-
33750290259
-
YA-TRAP: Yet another trivial RFID authentication protocol
-
Pisa, Italy, March, IEEE Computer Society
-
G. Tsudik, "YA-TRAP: yet another trivial RFID authentication protocol," In Fourth IEEE Annual Conference on Pervasive Computing and Communications - PerCom 2006, pages 640-643, Pisa, Italy, March 2006. IEEE Computer Society.
-
(2006)
Fourth IEEE Annual Conference on Pervasive Computing and Communications-PerCom 2006
, pp. 640-643
-
-
Tsudik, G.1
-
11
-
-
70449579747
-
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
-
M. Burmester, B. de Medeiros, and R. Motta, "Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries," Journal of Applied Cryptography, 1(2):79-90, 2008.
-
(2008)
Journal of Applied Cryptography
, vol.1
, Issue.2
, pp. 79-90
-
-
Burmester, M.1
Medeiros, B.D.2
Motta, R.3
-
12
-
-
70349155465
-
Attacks and improvements to an RFID mutual authentication protocol and its extensions
-
Zurich, Switzerland, March, ACM Press
-
S. Cai, Y. Li, T. Li, and R. Deng, "Attacks and improvements to an RFID mutual authentication protocol and its extensions," In The Second ACM Conference on Wireless Network Security - WiSec09, pages 51-58, Zurich, Switzerland, March 2009. ACM Press.
-
(2009)
The Second ACM Conference on Wireless Network Security-WiSec09
, pp. 51-58
-
-
Cai, S.1
Li, Y.2
Li, T.3
Deng, R.4
-
13
-
-
72849108110
-
Scalable RFID pseudonym protocol
-
Gold Coast, Queensland, Australia, October, IEEE Computer Society
-
B. Song and C. Mitchell, "Scalable RFID pseudonym protocol," In: Proceedings of the Third International Conference on Network and System Security - NSS 2009, pages 216- 224, Gold Coast, Queensland, Australia, October 2009. IEEE Computer Society.
-
(2009)
Proceedings of the Third International Conference on Network and System Security-NSS 2009
, pp. 216-224
-
-
Song, B.1
Mitchell, C.2
-
14
-
-
38049125926
-
LRMAP: Lightweight and resynchronous mutual authentication protocol for RFID system
-
F. Stajano, H. Kim, J. Chae and S. Kim editors, volume 4412 of Lecture Notes in Computer Science, Jeju Island, Korea, December, Springer-Verlag, Berlin
-
J. Ha, J. Ha, S. Moon, and C. Boyd, "LRMAP: lightweight and resynchronous mutual authentication protocol for RFID system," In F. Stajano, H. Kim, J. Chae and S. Kim editors, Ubiquitous Convergence Technology, First International Conference - ICUCT 2006, volume 4412 of Lecture Notes in Computer Science, pages 80-89, Jeju Island, Korea, December 2006. Springer-Verlag, Berlin.
-
(2006)
Ubiquitous Convergence Technology, First International Conference-ICUCT 2006
, pp. 80-89
-
-
Ha, J.1
Ha, J.2
Moon, S.3
Boyd, C.4
-
15
-
-
63149156361
-
An efficient RFID authentication protocol for lowcost tags
-
Shanghai, China, December, IEEE Computer Society
-
Y. Liu, "An efficient RFID authentication protocol for lowcost tags," In Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing - EUC 2008, pages 706-711, Shanghai, China, December 2008. IEEE Computer Society.
-
(2008)
Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing-EUC 2008
, pp. 706-711
-
-
Liu, Y.1
-
18
-
-
34547687590
-
Defining strong privacy for RFID
-
New York, USA, March
-
A. Juels and S.A. Weis, "Defining strong privacy for RFID," In International Conference on Pervasive Computing and Communications - IEEE PerCom 07, pages 342-347, New York, USA, March 2007.
-
(2007)
International Conference on Pervasive Computing and Communications-IEEE PerCom 07
, pp. 342-347
-
-
Juels, A.1
Weis, S.A.2
|