-
1
-
-
70349117963
-
-
Atmel Corporation: Innovative IDIC solutions (2007), http://www.atmel. com/dyn/resources/prod-documents/doc4602.pdf
-
(2007)
Innovative IDIC Solutions
-
-
-
2
-
-
71549116235
-
-
NXP Semiconductors: September
-
NXP Semiconductors: MIFARE Smartcard ICs (September 2008), http://www.mifare.net/products/smartcardics/
-
(2008)
MIFARE Smartcard ICs
-
-
-
3
-
-
78650127877
-
User privacy in transport systems based on RFID e-tickets
-
Sadeghi, A.R., Visconti, I., Wachsmann, C.: User privacy in transport systems based on RFID e-tickets. International Workshop on Privacy in Location-Based Applications (PiLBA), Malaga, Spain (October 9, 2008)
-
International Workshop on Privacy in Location-Based Applications (PiLBA), Malaga, Spain (October 9, 2008)
-
-
Sadeghi, A.R.1
Visconti, I.2
Wachsmann, C.3
-
4
-
-
78650097644
-
Machine Readable Travel Documents
-
Organization, I.C.A.: Doc 9303, Part 1 (edn.)
-
Organization, I.C.A.: Machine Readable Travel Documents, Doc 9303, Part 1 Machine Readable Passports, 5 (edn.) (2003)
-
(2003)
Machine Readable Passports
, vol.5
-
-
-
5
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. Springer, Heidelberg
-
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 50-59. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2802
, pp. 50-59
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
6
-
-
33144457479
-
RFID security and privacy: A research survey
-
Juels, A.: RFID security and privacy: A research survey. Journal of Selected Areas in Communication 24(2), 381-395 (2006)
-
(2006)
Journal of Selected Areas in Communication
, vol.24
, Issue.2
, pp. 381-395
-
-
Juels, A.1
-
7
-
-
70349088651
-
Location privacy in RFID applications
-
Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Privacy in Location-Based Applications. Springer, Heidelberg
-
Sadeghi, A.R., Visconti, I., Wachsmann, C.: Location privacy in RFID applications. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Privacy in Location-Based Applications. LNCS, vol. 5599, pp. 127-150. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5599
, pp. 127-150
-
-
Sadeghi, A.R.1
Visconti, I.2
Wachsmann, C.3
-
8
-
-
78650151843
-
On RFID privacy with mutual authentication and tag corruption
-
Zhou, J. (ed.) ACNS 2010. Springer, Heidelberg
-
Sadeghi, A.R., Visconti, I., Wachsmann, C.: On RFID privacy with mutual authentication and tag corruption. In: Zhou, J. (ed.) ACNS 2010. LNCS, vol. 6123, pp. 493-510. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6123
, pp. 493-510
-
-
Sadeghi, A.R.1
Visconti, I.2
Wachsmann, C.3
-
9
-
-
84981171135
-
-
April
-
Avoine, G.: RFID Lounge (April 2010), http://www.avoine.net/rfid/
-
(2010)
RFID Lounge
-
-
Avoine, G.1
-
10
-
-
70349149683
-
Privacy for Public Transportation
-
Danezis, G., Golle, P. (eds.) PET 2006. Springer, Heidelberg
-
Heydt-Benjamin, T.S., Chae, H.J., Defend, B., Fu, K.: Privacy for Public Transportation. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 1-19. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4258
, pp. 1-19
-
-
Heydt-Benjamin, T.S.1
Chae, H.J.2
Defend, B.3
Fu, K.4
-
11
-
-
74049130607
-
PSP: Private and secure payment with RFID
-
Report 2009/181
-
Blass, E.O., Kurmus, A., Molva, R., Strufe, T.: PSP: Private and secure payment with RFID. Cryptology ePrint Archive, Report 2009/181 (2009)
-
(2009)
Cryptology ePrint Archive
-
-
Blass, E.O.1
Kurmus, A.2
Molva, R.3
Strufe, T.4
-
12
-
-
74049125197
-
Anonymous credentials on a standard Java Card
-
ACM Press, New York
-
Bichsel, P., Camenisch, J., Groß, T., Shoup, V.: Anonymous credentials on a standard Java Card. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 600-610. ACM Press, New York (2009)
-
(2009)
Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 600-610
-
-
Bichsel, P.1
Camenisch, J.2
Groß, T.3
Shoup, V.4
-
14
-
-
78650134047
-
Modeling privacy for off-line RFID systems
-
Garcia, F.D., van Rossum, P.: Modeling privacy for off-line RFID systems. In: RFIDSec 2009 (2009)
-
(2009)
RFIDSec 2009
-
-
Garcia, F.D.1
Van Rossum, P.2
-
15
-
-
78650161596
-
Readers behaving badly: Reader revocation in PKI-based RFID systems
-
Report 2009/465
-
Nithyanand, R., Tsudik, G., Uzun, E.: Readers behaving badly: Reader revocation in PKI-based RFID systems. Cryptology ePrint Archive, Report 2009/465 (2009)
-
(2009)
Cryptology ePrint Archive
-
-
Nithyanand, R.1
Tsudik, G.2
Uzun, E.3
-
16
-
-
35248839965
-
A signature scheme with efficient protocols
-
Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2576
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
17
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
20
-
-
35248832722
-
Squealing Euros: Privacy protection in RFID-enabled banknotes
-
Wright, R.N. (ed.) FC 2003. Springer, Heidelberg
-
Juels, A., Pappu, R.: Squealing Euros: Privacy protection in RFID-enabled banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 103-121. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2742
, pp. 103-121
-
-
Juels, A.1
Pappu, R.2
-
21
-
-
35048899238
-
Universal re-encryption for mixnets
-
Okamoto, T. (ed.) CT-RSA 2004. Springer, Heidelberg
-
Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal re-encryption for mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163-178. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2964
, pp. 163-178
-
-
Golle, P.1
Jakobsson, M.2
Juels, A.3
Syverson, P.4
-
22
-
-
35048904109
-
Enhancing privacy of universal re-encryption scheme for RFID tags
-
Yang, L.T., Guo, M., Gao, G.R., Jha, N.K. (eds.) EUC 2004. Springer, Heidelberg
-
Saito, J., Ryou, J.C., Sakurai, K.: Enhancing privacy of universal re-encryption scheme for RFID tags. In: Yang, L.T., Guo, M., Gao, G.R., Jha, N.K. (eds.) EUC 2004. LNCS, vol. 3207, pp. 879-890. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3207
, pp. 879-890
-
-
Saito, J.1
Ryou, J.C.2
Sakurai, K.3
-
23
-
-
33745797863
-
Untraceable RFID tags via insubvertible encryption
-
ACM Press, New York
-
Ateniese, G., Camenisch, J., de Medeiros, B.: Untraceable RFID tags via insubvertible encryption. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, pp. 92-101. ACM Press, New York (2005)
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
, pp. 92-101
-
-
Ateniese, G.1
Camenisch, J.2
De Medeiros, B.3
-
24
-
-
71549125572
-
Anonymizer-enabled security and privacy for RFID
-
Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. Springer, Heidelberg
-
Sadeghi, A.R., Visconti, I., Wachsmann, C.: Anonymizer-enabled security and privacy for RFID. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 134-153. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5888
, pp. 134-153
-
-
Sadeghi, A.R.1
Visconti, I.2
Wachsmann, C.3
-
25
-
-
33744957484
-
Adversarial model for radio frequency identification
-
Report 2005/049
-
Avoine, G.: Adversarial model for radio frequency identification. Cryptology ePrint Archive, Report 2005/049 (2005)
-
(2005)
Cryptology ePrint Archive
-
-
Avoine, G.1
-
27
-
-
38149038702
-
On privacy models for RFID
-
Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
-
Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68-87. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 68-87
-
-
Vaudenay, S.1
-
28
-
-
76849106311
-
Universally composable RFID identification and authentication protocols
-
Burmester, M., Le, T.V., Medeiros, B.D., Tsudik, G.: Universally composable RFID identification and authentication protocols. ACM Transactions on Information and System Security (TISSEC) 12(4) (2009)
-
(2009)
ACM Transactions on Information and System Security (TISSEC)
, vol.12
, Issue.4
-
-
Burmester, M.1
Le, T.V.2
Medeiros, B.D.3
Tsudik, G.4
-
29
-
-
78650166385
-
Efficient online/offline identity-based signature for wireless sensor network
-
Report 2010/003
-
Liu, J.K., Baek, J., Zhou, J., Yang, Y., Wong, J.W.: Efficient online/offline identity-based signature for wireless sensor network. Cryptology ePrint Archive, Report 2010/003 (2010)
-
(2010)
Cryptology ePrint Archive
-
-
Liu, J.K.1
Baek, J.2
Zhou, J.3
Yang, Y.4
Wong, J.W.5
-
30
-
-
78650144734
-
-
July
-
Atmel Corporation: Secure RFID: CryptoRF (July 2009), http://www.atmel.com/products/SecureRF
-
(2009)
Secure RFID: CryptoRF
-
-
-
31
-
-
78650152336
-
-
NXP Semiconductors: July
-
NXP Semiconductors: MiFare SmartMX (July 2009), http://www.mifare.net/ products/smartcardics/smartmx.asp
-
(2009)
MiFare SmartMX
-
-
-
32
-
-
33745654539
-
RFID-tags for anti-counterfeiting
-
Pointcheval, D. (ed.) CT-RSA 2006. Springer, Heidelberg
-
Tuyls, P., Batina, L.: RFID-tags for anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115-131. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3860
, pp. 115-131
-
-
Tuyls, P.1
Batina, L.2
-
34
-
-
49049105769
-
Design and implementation of PUF-based unclonable RFID ICs for anti-counterfeiting and security applications
-
IEEE Computer Society, Los Alamitos
-
Devadas, S., Suh, E., Paral, S., Sowell, R., Ziola, T., Khandelwal, V.: Design and implementation of PUF-based unclonable RFID ICs for anti-counterfeiting and security applications. In: IEEE International Conference on RFID 2008, Las Vegas, NV, USA, April 16-17, pp. 58-64. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
IEEE International Conference on RFID 2008, Las Vegas, NV, USA, April 16-17
, pp. 58-64
-
-
Devadas, S.1
Suh, E.2
Paral, S.3
Sowell, R.4
Ziola, T.5
Khandelwal, V.6
-
35
-
-
84946840347
-
Short signatures from the Weil pairing
-
Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
-
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514-532. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
37
-
-
77954741944
-
On the design and implementation of an efficient DAA scheme
-
Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. Springer, Heidelberg
-
Chen, L., Page, D., Smart, N.: On the design and implementation of an efficient DAA scheme. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol. 6035, pp. 223-237. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6035
, pp. 223-237
-
-
Chen, L.1
Page, D.2
Smart, N.3
-
38
-
-
0031351741
-
A concrete security treatment of symmetric encryption: Analysis of the des modes of operation
-
IEEE, Los Alamitos
-
Bellare, M., Desai, A., Jokipii, E., Rogawayy, P.: A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation. In: Proceedings of the 38th Symposium on Foundations of Computer Science. IEEE, Los Alamitos (1997)
-
(1997)
Proceedings of the 38th Symposium on Foundations of Computer Science
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogawayy, P.4
|